0x4008f510, 0x0) [ 1007.561877][T13231] loop4: detected capacity change from 0 to 178 [ 1007.586289][T13231] Currently only 4K block size supported! [ 1007.592296][T13231] Mount JFS Failure: -22 [ 1007.598210][T13231] jfs_mount failed w/return code = -22 12:01:01 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x319, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800f}], 0x0, &(0x7f0000061000)) [ 1007.693389][T13243] loop2: detected capacity change from 0 to 178 [ 1007.758567][T13257] loop3: detected capacity change from 0 to 128 [ 1007.770139][T13257] Mount JFS Failure: -22 [ 1007.775052][T13257] jfs_mount failed w/return code = -22 [ 1007.791963][T13243] Currently only 4K block size supported! [ 1007.798708][T13243] Mount JFS Failure: -22 [ 1007.803241][T13243] jfs_mount failed w/return code = -22 12:01:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000003600000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:01 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x5, &(0x7f0000000100), 0x4) 12:01:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001011000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:01 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x31e, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x46000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1007.908185][T13272] loop4: detected capacity change from 0 to 178 12:01:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8010}], 0x0, &(0x7f0000061000)) [ 1007.968503][T13272] Currently only 4K block size supported! 12:01:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000003700000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1008.012678][T13272] Mount JFS Failure: -22 [ 1008.021372][T13272] jfs_mount failed w/return code = -22 12:01:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x34d, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:02 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x5, &(0x7f0000000100), 0x4) 12:01:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x4d030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1008.107759][T13293] loop2: detected capacity change from 0 to 178 12:01:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000101e000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1008.171090][T13299] loop3: detected capacity change from 0 to 128 [ 1008.185681][T13293] Currently only 4K block size supported! 12:01:02 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x5, &(0x7f0000000100), 0x4) [ 1008.221524][T13299] Mount JFS Failure: -22 [ 1008.230132][T13293] Mount JFS Failure: -22 [ 1008.231610][T13299] jfs_mount failed w/return code = -22 [ 1008.256038][T13293] jfs_mount failed w/return code = -22 12:01:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x50010000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1008.313549][T13320] loop4: detected capacity change from 0 to 178 [ 1008.337387][T13320] Currently only 4K block size supported! [ 1008.344377][T13320] Mount JFS Failure: -22 [ 1008.349518][T13320] jfs_mount failed w/return code = -22 12:01:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8011}], 0x0, &(0x7f0000061000)) 12:01:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x352, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:02 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x5, &(0x7f0000000100), 0x4) 12:01:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000003800000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001023000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1008.502290][T13335] loop3: detected capacity change from 0 to 128 [ 1008.532218][T13335] Mount JFS Failure: -22 [ 1008.537455][T13335] jfs_mount failed w/return code = -22 12:01:02 executing program 1: r0 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4b47) ioctl$LOOP_CTL_ADD(0xffffffffffffffff, 0x4c80, r0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) 12:01:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x52030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x3b4, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1008.564098][T13351] loop2: detected capacity change from 0 to 178 [ 1008.570820][T13352] loop4: detected capacity change from 0 to 178 12:01:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8023}], 0x0, &(0x7f0000061000)) [ 1008.643130][T13352] Currently only 4K block size supported! [ 1008.650191][T13351] Currently only 4K block size supported! [ 1008.665098][T13352] Mount JFS Failure: -22 [ 1008.669746][T13351] Mount JFS Failure: -22 [ 1008.684022][T13352] jfs_mount failed w/return code = -22 [ 1008.689795][T13351] jfs_mount failed w/return code = -22 12:01:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x5c000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:02 executing program 1: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000003c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf1, 0xf1, 0x3, [@array, @struct={0x0, 0x3, 0x0, 0x4, 0x0, 0x0, [{}, {}, {}]}, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @enum={0x0, 0x9, 0x0, 0x6, 0x4, [{}, {}, {}, {}, {}, {}, {}, {}, {}]}, @datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "b5"}]}, {0x0, [0x0]}}, 0x0, 0x10f}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 12:01:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x3c1, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000003c00000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001048000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1008.788624][T13380] loop3: detected capacity change from 0 to 128 [ 1008.814310][T13380] Mount JFS Failure: -22 [ 1008.819162][T13380] jfs_mount failed w/return code = -22 12:01:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x3d6, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8048}], 0x0, &(0x7f0000061000)) 12:01:03 executing program 1: syz_open_dev$vcsu(0xfffffffffffffffe, 0x0, 0x0) [ 1008.923705][T13401] ptrace attach of "/root/syz-executor.1"[13398] was attempted by "/root/syz-executor.1"[13401] [ 1008.975211][T13403] loop4: detected capacity change from 0 to 178 [ 1009.012273][T13403] Currently only 4K block size supported! [ 1009.018844][T13403] Mount JFS Failure: -22 12:01:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x6a020000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1009.023368][T13403] jfs_mount failed w/return code = -22 12:01:03 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x3dd, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1009.075788][T13404] loop2: detected capacity change from 0 to 178 12:01:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000104c000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1009.181987][T13404] Currently only 4K block size supported! [ 1009.188465][T13404] Mount JFS Failure: -22 [ 1009.193134][T13404] jfs_mount failed w/return code = -22 12:01:03 executing program 1: syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), 0xffffffffffffffff) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 12:01:03 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x3fa, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000004900000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1009.222851][T13418] loop3: detected capacity change from 0 to 128 12:01:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x7b000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1009.284676][T13418] Mount JFS Failure: -22 [ 1009.289359][T13418] jfs_mount failed w/return code = -22 [ 1009.289512][T13439] loop2: detected capacity change from 0 to 178 [ 1009.305466][T13439] Currently only 4K block size supported! [ 1009.311231][T13439] Mount JFS Failure: -22 [ 1009.318089][T13439] jfs_mount failed w/return code = -22 [ 1009.359282][T13445] loop4: detected capacity change from 0 to 178 [ 1009.393270][T13445] Currently only 4K block size supported! 12:01:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x82010000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000005100000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1009.471493][T13445] Mount JFS Failure: -22 12:01:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x804c}], 0x0, &(0x7f0000061000)) 12:01:03 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x700, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendmsg$SMC_PNETID_FLUSH(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={0x0, 0x78}}, 0x2400c000) [ 1009.509659][T13445] jfs_mount failed w/return code = -22 12:01:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x91020000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1009.607593][T13477] loop2: detected capacity change from 0 to 178 [ 1009.633278][T13477] Currently only 4K block size supported! [ 1009.640804][T13485] loop3: detected capacity change from 0 to 128 12:01:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001060000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:03 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xe00, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1009.671932][T13477] Mount JFS Failure: -22 [ 1009.677358][T13485] Mount JFS Failure: -22 12:01:03 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f00000000c0)={@loopback, 0x0, 0x3}, 0x20) [ 1009.713147][T13485] jfs_mount failed w/return code = -22 [ 1009.720673][T13477] jfs_mount failed w/return code = -22 12:01:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8060}], 0x0, &(0x7f0000061000)) [ 1009.799810][T13502] loop4: detected capacity change from 0 to 178 [ 1009.809615][T13502] Currently only 4K block size supported! [ 1009.815540][T13502] Mount JFS Failure: -22 [ 1009.819852][T13502] jfs_mount failed w/return code = -22 12:01:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0xa3020000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001068000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000005d00000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:04 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x1802, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8068}], 0x0, &(0x7f0000061000)) 12:01:04 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x13, r0, 0x10000000) [ 1010.043412][T13530] loop4: detected capacity change from 0 to 178 12:01:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0xa5020000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x518, 0x2a0, 0x0, 0x140, 0x140, 0x4b0, 0x5a0, 0x5a0, 0x5a0, 0x5a0, 0x5a0, 0x6, 0x0, {[{{@uncond, 0x0, 0xa8, 0xd0}, @inet=@TOS={0x28}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "e60d1cba04eb0d83aec245df1e607e951843e01c6ed0a44fd947bcbb9b46"}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@mcast2, @private2, [], [], 'ip_vti0\x00', 'batadv_slave_0\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@broadcast, @ipv4=@dev}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x578) [ 1010.103886][T13530] Currently only 4K block size supported! [ 1010.121630][T13530] Mount JFS Failure: -22 [ 1010.128330][T13530] jfs_mount failed w/return code = -22 [ 1010.129171][T13536] loop2: detected capacity change from 0 to 178 [ 1010.140503][T13543] loop3: detected capacity change from 0 to 128 12:01:04 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x1903, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1010.163872][T13543] Mount JFS Failure: -22 [ 1010.168213][T13543] jfs_mount failed w/return code = -22 [ 1010.178523][T13536] Currently only 4K block size supported! [ 1010.190723][T13536] Mount JFS Failure: -22 [ 1010.199205][T13536] jfs_mount failed w/return code = -22 12:01:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0xb4030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000106c000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x806c}], 0x0, &(0x7f0000061000)) 12:01:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000006f00000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:04 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 12:01:04 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x1a01, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0xbe010000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1010.435529][T13584] loop2: detected capacity change from 0 to 178 [ 1010.466325][T13583] loop4: detected capacity change from 0 to 178 [ 1010.479109][T13584] Currently only 4K block size supported! 12:01:04 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x1b, &(0x7f0000000000)=ANY=[@ANYBLOB="80"], 0x18) [ 1010.498513][T13589] loop3: detected capacity change from 0 to 128 [ 1010.506475][T13583] Currently only 4K block size supported! [ 1010.511365][T13584] Mount JFS Failure: -22 [ 1010.528222][T13584] jfs_mount failed w/return code = -22 [ 1010.540154][T13589] Mount JFS Failure: -22 [ 1010.546806][T13583] Mount JFS Failure: -22 12:01:04 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x1e03, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1010.569064][T13589] jfs_mount failed w/return code = -22 [ 1010.591105][T13583] jfs_mount failed w/return code = -22 12:01:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0xc1030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000000b000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001074000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8074}], 0x0, &(0x7f0000061000)) 12:01:04 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x4500, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:04 executing program 1: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r0, 0x5452) 12:01:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0xd6030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1010.868793][T13631] loop3: detected capacity change from 0 to 128 [ 1010.882218][T13628] loop2: detected capacity change from 0 to 178 [ 1010.906681][T13631] Mount JFS Failure: -22 [ 1010.911598][T13631] jfs_mount failed w/return code = -22 12:01:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x4600, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1010.917845][T13635] loop4: detected capacity change from 0 to 178 [ 1010.928034][T13635] Currently only 4K block size supported! [ 1010.928371][T13628] Currently only 4K block size supported! [ 1010.934161][T13635] Mount JFS Failure: -22 [ 1010.944452][T13635] jfs_mount failed w/return code = -22 [ 1010.954936][T13628] Mount JFS Failure: -22 [ 1010.960514][T13628] jfs_mount failed w/return code = -22 12:01:05 executing program 1: syz_mount_image$vfat(&(0x7f0000002440), &(0x7f0000002480)='./file0\x00', 0x0, 0x0, &(0x7f0000002800), 0x0, &(0x7f0000002880)={[{@utf8no}]}) 12:01:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x807a}], 0x0, &(0x7f0000061000)) 12:01:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000107a000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0xd9020000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001002000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x4d03, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1011.181595][T13665] loop4: detected capacity change from 0 to 178 12:01:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0xdd030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1011.245442][T13665] Currently only 4K block size supported! [ 1011.277268][T13673] loop2: detected capacity change from 0 to 178 [ 1011.291223][T13675] FAT-fs (loop1): bogus number of reserved sectors [ 1011.300079][T13677] loop3: detected capacity change from 0 to 128 [ 1011.327492][T13665] Mount JFS Failure: -22 12:01:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x5001, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1011.349218][T13673] Currently only 4K block size supported! [ 1011.370319][T13665] jfs_mount failed w/return code = -22 [ 1011.373338][T13675] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1011.376662][T13673] Mount JFS Failure: -22 [ 1011.385038][T13677] Mount JFS Failure: -22 [ 1011.420313][T13673] jfs_mount failed w/return code = -22 [ 1011.426732][T13677] jfs_mount failed w/return code = -22 [ 1011.449225][T13675] FAT-fs (loop1): bogus number of reserved sectors 12:01:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0xe1000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1011.465851][T13675] FAT-fs (loop1): Can't find a valid FAT filesystem 12:01:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x80fe}], 0x0, &(0x7f0000061000)) 12:01:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x5203, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001003000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:05 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x6c0, 0x500, 0x3e0, 0x5f0, 0x0, 0x2a0, 0x5f0, 0x5f0, 0x5f0, 0x5f0, 0x5f0, 0x6, 0x0, {[{{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@hbh={{0x48}}]}, @inet=@TOS={0x28}}, {{@uncond, 0x0, 0x120, 0x160, 0x0, {}, [@common=@srh={{0xa}}, @common=@hbh={{0x48}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}, {{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@hbh={{0x48}}]}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@mcast2, @private2, [], [], 'ip_vti0\x00', 'batadv_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@icmp6={{0x28}, {0x0, "14bf"}}, @common=@icmp6={{0x28}, {0x0, "707f"}}]}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@remote, @ipv4=@dev}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x720) 12:01:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000030c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1011.646607][T13717] loop3: detected capacity change from 0 to 128 [ 1011.670353][T13717] Mount JFS Failure: -22 [ 1011.682560][T13717] jfs_mount failed w/return code = -22 12:01:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x5c00, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1011.709556][T13725] loop2: detected capacity change from 0 to 178 [ 1011.743382][T13725] Currently only 4K block size supported! [ 1011.750521][T13725] Mount JFS Failure: -22 [ 1011.755929][T13725] jfs_mount failed w/return code = -22 12:01:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0xf0000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xff00}], 0x0, &(0x7f0000061000)) [ 1011.780097][T13738] loop4: detected capacity change from 0 to 178 12:01:05 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x4, 0x0) ioctl$LOOP_GET_STATUS(r0, 0x4c03, &(0x7f0000000080)) [ 1011.876782][T13738] Currently only 4K block size supported! 12:01:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001004000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1011.928387][T13738] Mount JFS Failure: -22 [ 1011.972034][T13738] jfs_mount failed w/return code = -22 12:01:06 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x6a02, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0xf4020000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:06 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f00000029c0), 0x4000, 0x0) [ 1012.025559][T13758] loop3: detected capacity change from 0 to 255 [ 1012.051897][T13758] Mount JFS Failure: -22 12:01:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000050c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1012.071105][T13758] jfs_mount failed w/return code = -22 [ 1012.127706][T13764] loop2: detected capacity change from 0 to 178 [ 1012.160122][T13764] Currently only 4K block size supported! [ 1012.168120][T13764] Mount JFS Failure: -22 [ 1012.177250][T13764] jfs_mount failed w/return code = -22 12:01:06 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x7b00, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:06 executing program 1: r0 = socket(0x11, 0x3, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000180)={&(0x7f0000000040), 0xc, &(0x7f0000000140)={0x0, 0xb4}}, 0x0) 12:01:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x2, &(0x7f0000061000)) [ 1012.246226][T13785] loop4: detected capacity change from 0 to 178 [ 1012.259529][T13785] Currently only 4K block size supported! [ 1012.266855][T13785] Mount JFS Failure: -22 [ 1012.272411][T13785] jfs_mount failed w/return code = -22 12:01:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0xfa030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001005000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:06 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000480)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x6}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 12:01:06 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x8201, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000060c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1012.444210][T13804] loop3: detected capacity change from 0 to 128 [ 1012.472388][T13804] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1012.495162][T13804] Mount JFS Failure: -5 [ 1012.500310][T13804] jfs_mount failed w/return code = -5 [ 1012.543162][T13815] loop2: detected capacity change from 0 to 178 [ 1012.555983][T13817] loop4: detected capacity change from 0 to 178 12:01:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x2}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:06 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x9102, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1012.608783][T13815] Currently only 4K block size supported! [ 1012.615962][T13817] Currently only 4K block size supported! [ 1012.624794][T13815] Mount JFS Failure: -22 [ 1012.630197][T13817] Mount JFS Failure: -22 12:01:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x3, &(0x7f0000061000)) [ 1012.665073][T13815] jfs_mount failed w/return code = -22 [ 1012.674303][T13817] jfs_mount failed w/return code = -22 12:01:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000070c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001006000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:07 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x3}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1013.084913][T13843] loop4: detected capacity change from 0 to 178 [ 1013.092584][T13844] loop3: detected capacity change from 0 to 128 [ 1013.105983][T13843] Currently only 4K block size supported! [ 1013.117754][T13844] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1013.124307][T13843] Mount JFS Failure: -22 12:01:07 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xa302, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1013.131319][T13844] Mount JFS Failure: -5 [ 1013.136519][T13843] jfs_mount failed w/return code = -22 [ 1013.142370][T13844] jfs_mount failed w/return code = -5 [ 1013.153983][T13852] loop2: detected capacity change from 0 to 178 [ 1013.184270][T13852] Currently only 4K block size supported! 12:01:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x4, &(0x7f0000061000)) 12:01:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000090c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1013.303634][T13852] Mount JFS Failure: -22 [ 1013.321986][T13852] jfs_mount failed w/return code = -22 [ 1013.979175][T13886] loop3: detected capacity change from 0 to 128 [ 1013.993025][T13886] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1013.997754][T13888] loop4: detected capacity change from 0 to 178 [ 1014.000102][T13886] Mount JFS Failure: -5 [ 1014.016767][T13886] jfs_mount failed w/return code = -5 [ 1014.148776][T13888] Currently only 4K block size supported! [ 1014.208845][T13888] Mount JFS Failure: -22 [ 1014.238013][T13888] jfs_mount failed w/return code = -22 12:01:09 executing program 1: bpf$MAP_CREATE(0xc, 0x0, 0x0) 12:01:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001007000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x4}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:09 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xa502, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x5, &(0x7f0000061000)) 12:01:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000a0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1015.157566][T13913] loop4: detected capacity change from 0 to 178 [ 1015.186853][T13913] Currently only 4K block size supported! [ 1015.189616][T13915] loop2: detected capacity change from 0 to 178 [ 1015.199562][T13913] Mount JFS Failure: -22 12:01:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1015.199574][T13913] jfs_mount failed w/return code = -22 [ 1015.214899][T13919] loop3: detected capacity change from 0 to 128 [ 1015.218761][T13919] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:01:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x7}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1015.218808][T13919] Mount JFS Failure: -5 [ 1015.218816][T13919] jfs_mount failed w/return code = -5 12:01:09 executing program 1: pselect6(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x0, 0x989680}, 0x0) 12:01:09 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xb403, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x6, &(0x7f0000061000)) [ 1015.364514][T13915] Currently only 4K block size supported! 12:01:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xe}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1015.433644][T13946] loop4: detected capacity change from 0 to 178 [ 1015.448614][T13915] Mount JFS Failure: -22 [ 1015.453154][T13915] jfs_mount failed w/return code = -22 [ 1015.460796][T13946] Currently only 4K block size supported! 12:01:09 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xbe01, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1015.488558][T13946] Mount JFS Failure: -22 [ 1015.493271][T13946] jfs_mount failed w/return code = -22 [ 1015.522976][T13953] loop3: detected capacity change from 0 to 128 [ 1015.577139][T13953] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1015.583540][T13953] Mount JFS Failure: -5 [ 1015.590446][T13953] jfs_mount failed w/return code = -5 12:01:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x45}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:09 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x4b, 0x0, 0x4) 12:01:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001008000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000d0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x7, &(0x7f0000061000)) 12:01:09 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x4, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x1260, 0x0) 12:01:09 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xc103, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x46}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1015.797074][T13984] loop4: detected capacity change from 0 to 178 [ 1015.855221][T13984] Currently only 4K block size supported! [ 1015.880524][T13990] loop2: detected capacity change from 0 to 178 [ 1015.898630][T13984] Mount JFS Failure: -22 [ 1015.910193][T13990] Currently only 4K block size supported! [ 1015.920842][T13984] jfs_mount failed w/return code = -22 [ 1015.922040][T13996] loop3: detected capacity change from 0 to 128 [ 1015.937514][T13990] Mount JFS Failure: -22 [ 1015.954020][T13996] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1015.960292][T13996] Mount JFS Failure: -5 [ 1015.986012][T13996] jfs_mount failed w/return code = -5 [ 1016.014567][T13990] jfs_mount failed w/return code = -22 12:01:10 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x22, &(0x7f0000000100), 0x4) 12:01:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x8, &(0x7f0000061000)) 12:01:10 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xd603, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x5c}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000f0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001009000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:10 executing program 1: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 12:01:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x7b}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1016.329590][T14035] loop3: detected capacity change from 0 to 128 [ 1016.350908][T14039] loop4: detected capacity change from 0 to 178 [ 1016.365499][T14044] loop2: detected capacity change from 0 to 178 12:01:10 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xd902, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1016.386274][T14044] Currently only 4K block size supported! [ 1016.401705][T14044] Mount JFS Failure: -22 [ 1016.402340][T14039] Currently only 4K block size supported! [ 1016.408412][T14044] jfs_mount failed w/return code = -22 [ 1016.416433][T14035] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1016.425244][T14035] Mount JFS Failure: -5 [ 1016.429497][T14035] jfs_mount failed w/return code = -5 12:01:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100a000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1016.431662][T14039] Mount JFS Failure: -22 [ 1016.456427][T14039] jfs_mount failed w/return code = -22 12:01:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x9, &(0x7f0000061000)) 12:01:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001020100c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1016.702893][T14065] loop4: detected capacity change from 0 to 178 12:01:10 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x400448dd, 0x0) 12:01:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xe1}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:10 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xdd03, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1016.800250][T14071] loop3: detected capacity change from 0 to 128 [ 1016.807305][T14070] loop2: detected capacity change from 0 to 178 [ 1016.837303][T14065] Currently only 4K block size supported! [ 1016.843232][T14065] Mount JFS Failure: -22 [ 1016.849460][T14065] jfs_mount failed w/return code = -22 [ 1016.861626][T14071] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1016.868872][T14071] Mount JFS Failure: -5 [ 1016.873036][T14071] jfs_mount failed w/return code = -5 [ 1016.897513][T14070] Currently only 4K block size supported! [ 1016.905032][T14070] Mount JFS Failure: -22 [ 1016.910419][T14070] jfs_mount failed w/return code = -22 12:01:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000110c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xa, &(0x7f0000061000)) 12:01:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100c000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:11 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xf0}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xe100, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1017.192067][T14105] loop4: detected capacity change from 0 to 178 [ 1017.199989][T14107] loop2: detected capacity change from 0 to 178 12:01:11 executing program 1: mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 12:01:11 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x11a}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xf000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1017.246058][T14105] Currently only 4K block size supported! [ 1017.255039][T14107] Currently only 4K block size supported! [ 1017.255893][T14110] loop3: detected capacity change from 0 to 128 [ 1017.261734][T14107] Mount JFS Failure: -22 [ 1017.274911][T14107] jfs_mount failed w/return code = -22 [ 1017.355920][T14105] Mount JFS Failure: -22 [ 1017.360519][T14105] jfs_mount failed w/return code = -22 [ 1017.371925][T14110] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1017.378996][T14110] Mount JFS Failure: -5 [ 1017.383289][T14110] jfs_mount failed w/return code = -5 12:01:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100d000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xf402, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010ae160c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xb, &(0x7f0000061000)) 12:01:11 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x150}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:11 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000004c0)={0xffffffffffffffff}) sendmmsg$sock(r0, &(0x7f00000021c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0) [ 1017.578913][T14149] loop2: detected capacity change from 0 to 178 [ 1017.617369][T14149] Currently only 4K block size supported! [ 1017.633896][T14149] Mount JFS Failure: -22 [ 1017.634009][T14158] loop4: detected capacity change from 0 to 178 [ 1017.639838][T14149] jfs_mount failed w/return code = -22 [ 1017.648361][T14153] loop3: detected capacity change from 0 to 128 12:01:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xfa03, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:11 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x182}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1017.700202][T14158] Currently only 4K block size supported! [ 1017.708019][T14153] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:01:11 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x37, &(0x7f00000001c0)={@mcast2}, 0x20) 12:01:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x20000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100f000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1017.771706][T14158] Mount JFS Failure: -22 [ 1017.780828][T14153] Mount JFS Failure: -5 [ 1017.794643][T14158] jfs_mount failed w/return code = -22 [ 1017.801658][T14153] jfs_mount failed w/return code = -5 12:01:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x40000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:11 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000001780), 0x212800, 0x0) 12:01:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010af160c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xc, &(0x7f0000061000)) 12:01:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x1be}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1017.929976][T14202] loop2: detected capacity change from 0 to 178 [ 1017.951194][T14202] Currently only 4K block size supported! [ 1017.958675][T14202] Mount JFS Failure: -22 [ 1017.963034][T14202] jfs_mount failed w/return code = -22 12:01:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x1000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:12 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x6c0, 0x500, 0x3e0, 0x5f0, 0x0, 0x2a0, 0x500, 0x5f0, 0x5f0, 0x5f0, 0x5f0, 0x6, 0x0, {[{{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@hbh={{0x48}}]}, @inet=@TOS={0x28}}, {{@uncond, 0x0, 0x120, 0x160, 0x0, {}, [@common=@srh={{0x30}}, @common=@hbh={{0x48}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}, {{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@hbh={{0x48}}]}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@mcast2, @private2, [], [], 'ip_vti0\x00', 'batadv_slave_0\x00'}, 0x0, 0xf8, 0x120, 0x0, {}, [@common=@icmp6={{0x28}, {0x0, "14bf"}}, @common=@icmp6={{0x28}, {0x0, "707f"}}]}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@remote, @ipv4=@dev}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x720) 12:01:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001010000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1018.027460][T14216] loop3: detected capacity change from 0 to 128 12:01:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x218}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1018.084952][T14216] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1018.091230][T14216] Mount JFS Failure: -5 [ 1018.091341][T14221] loop4: detected capacity change from 0 to 178 [ 1018.095879][T14216] jfs_mount failed w/return code = -5 [ 1018.119886][T14221] Currently only 4K block size supported! [ 1018.148385][T14221] Mount JFS Failure: -22 [ 1018.154822][T14221] jfs_mount failed w/return code = -22 12:01:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x2000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:12 executing program 1: r0 = timerfd_create(0x0, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080), 0x0) 12:01:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xd, &(0x7f0000061000)) 12:01:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010b0160c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1018.243141][T14247] loop2: detected capacity change from 0 to 178 12:01:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x26a}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1018.320567][T14247] Currently only 4K block size supported! [ 1018.342288][T14247] Mount JFS Failure: -22 12:01:12 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x0) [ 1018.373307][T14247] jfs_mount failed w/return code = -22 [ 1018.404265][T14267] loop3: detected capacity change from 0 to 128 [ 1018.412390][T14266] loop4: detected capacity change from 0 to 178 12:01:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x3000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1018.422014][T14267] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1018.433856][T14266] Currently only 4K block size supported! [ 1018.453026][T14267] Mount JFS Failure: -5 [ 1018.462004][T14266] Mount JFS Failure: -22 12:01:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001011000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x291}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x7000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1018.480799][T14267] jfs_mount failed w/return code = -5 [ 1018.488592][T14266] jfs_mount failed w/return code = -22 12:01:12 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x16, 0x0, 0xa0d9, 0xd9, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x4}, 0x40) 12:01:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010b1160c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xf, &(0x7f0000061000)) 12:01:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x2a3}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1018.647351][T14302] loop2: detected capacity change from 0 to 178 [ 1018.658123][T14302] Currently only 4K block size supported! [ 1018.664308][T14302] Mount JFS Failure: -22 [ 1018.668545][T14302] jfs_mount failed w/return code = -22 12:01:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001023000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xe000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1018.736932][T14313] loop3: detected capacity change from 0 to 128 [ 1018.744315][T14314] loop4: detected capacity change from 0 to 178 [ 1018.753415][T14314] Currently only 4K block size supported! [ 1018.776528][T14313] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1018.798025][T14313] Mount JFS Failure: -5 [ 1018.805581][T14314] Mount JFS Failure: -22 12:01:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x2a5}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1018.842544][T14314] jfs_mount failed w/return code = -22 [ 1018.850687][T14329] loop2: detected capacity change from 0 to 178 [ 1018.857567][T14313] jfs_mount failed w/return code = -5 [ 1018.861326][T14329] Currently only 4K block size supported! [ 1018.874231][T14329] Mount JFS Failure: -22 [ 1018.878470][T14329] jfs_mount failed w/return code = -22 12:01:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x18020000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001036000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010001e0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x2d9}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x10, &(0x7f0000061000)) 12:01:13 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) ioctl$sock_SIOCGIFBR(r0, 0x8940, &(0x7f0000000000)=@generic={0x3}) 12:01:13 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x19030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1019.155238][T14357] loop2: detected capacity change from 0 to 178 [ 1019.178038][T14364] loop4: detected capacity change from 0 to 178 12:01:13 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IPVS_CMD_SET_SERVICE(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000002c0)=ANY=[@ANYBLOB="980000009aa581"], 0x98}}, 0x0) [ 1019.205073][T14362] loop3: detected capacity change from 0 to 128 [ 1019.208594][T14364] Currently only 4K block size supported! [ 1019.219758][T14364] Mount JFS Failure: -22 [ 1019.225562][T14364] jfs_mount failed w/return code = -22 [ 1019.227067][T14357] Currently only 4K block size supported! [ 1019.241513][T14362] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:01:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x2f4}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1019.274493][T14362] Mount JFS Failure: -5 [ 1019.310831][T14357] Mount JFS Failure: -22 [ 1019.333099][T14362] jfs_mount failed w/return code = -5 [ 1019.351904][T14357] jfs_mount failed w/return code = -22 12:01:13 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x1a010000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010001f0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:13 executing program 1: syz_open_procfs$namespace(0x0, &(0x7f0000000240)='ns/mnt\x00') 12:01:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x11, &(0x7f0000061000)) 12:01:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001037000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x300}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1019.489525][T14404] loop4: detected capacity change from 0 to 178 12:01:13 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x1e030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1019.549093][T14404] Currently only 4K block size supported! 12:01:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x319}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:13 executing program 1: ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f0000000500)) mlock2(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0) munlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) munlock(&(0x7f0000ffe000/0x1000)=nil, 0x1000) [ 1019.617509][T14404] Mount JFS Failure: -22 [ 1019.634829][T14404] jfs_mount failed w/return code = -22 [ 1019.651174][T14421] loop3: detected capacity change from 0 to 128 [ 1019.654648][T14422] loop2: detected capacity change from 0 to 178 [ 1019.683388][T14421] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1019.701858][T14421] Mount JFS Failure: -5 [ 1019.707965][T14422] Currently only 4K block size supported! [ 1019.714756][T14421] jfs_mount failed w/return code = -5 [ 1019.740018][T14422] Mount JFS Failure: -22 12:01:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x31e}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:13 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x45000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1019.764446][T14422] jfs_mount failed w/return code = -22 12:01:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000200c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:13 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='dots,dots,dots,dots,nodots']) 12:01:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x23, &(0x7f0000061000)) 12:01:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001038000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1019.997981][T14456] loop4: detected capacity change from 0 to 178 12:01:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x46000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x34d}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1020.042189][T14456] Currently only 4K block size supported! [ 1020.051283][T14456] Mount JFS Failure: -22 [ 1020.056700][T14456] jfs_mount failed w/return code = -22 [ 1020.064995][T14464] loop3: detected capacity change from 0 to 128 [ 1020.081044][T14466] FAT-fs (loop1): bogus number of reserved sectors [ 1020.099894][T14466] FAT-fs (loop1): Can't find a valid FAT filesystem 12:01:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001010200c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x48, &(0x7f0000061000)) [ 1020.160082][T14472] loop2: detected capacity change from 0 to 178 12:01:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x352}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1020.253993][T14466] FAT-fs (loop1): bogus number of reserved sectors [ 1020.254441][T14472] Currently only 4K block size supported! [ 1020.281570][T14466] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1020.291213][T14472] Mount JFS Failure: -22 12:01:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x4d030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1020.301454][T14472] jfs_mount failed w/return code = -22 12:01:14 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x2d, &(0x7f0000000100), 0x4) [ 1020.337174][T14504] loop3: detected capacity change from 0 to 128 [ 1020.347606][T14504] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1020.355892][T14504] Mount JFS Failure: -5 [ 1020.360523][T14504] jfs_mount failed w/return code = -5 12:01:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001048000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x3b4}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1020.406957][T14508] loop4: detected capacity change from 0 to 178 12:01:14 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x22, &(0x7f0000000200), 0x10) 12:01:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x50010000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x4c, &(0x7f0000061000)) [ 1020.494417][T14508] Currently only 4K block size supported! [ 1020.500275][T14508] Mount JFS Failure: -22 [ 1020.547522][T14508] jfs_mount failed w/return code = -22 [ 1020.553788][T14535] loop3: detected capacity change from 0 to 128 [ 1020.568440][T14533] loop2: detected capacity change from 0 to 178 [ 1020.576997][T14535] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1020.580164][T14533] Currently only 4K block size supported! [ 1020.589391][T14533] Mount JFS Failure: -22 12:01:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x52030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1020.596805][T14533] jfs_mount failed w/return code = -22 12:01:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x3c1}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1020.630442][T14535] Mount JFS Failure: -5 [ 1020.643932][T14535] jfs_mount failed w/return code = -5 12:01:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000104c000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000230c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:14 executing program 1: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8901, 0x0) 12:01:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x5c000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x60, &(0x7f0000061000)) 12:01:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x3d6}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:14 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x80108907, 0x0) [ 1020.910285][T14567] loop2: detected capacity change from 0 to 178 12:01:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x6a020000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1020.950766][T14571] loop4: detected capacity change from 0 to 178 [ 1020.960721][T14567] Currently only 4K block size supported! [ 1020.975453][T14580] loop3: detected capacity change from 0 to 128 [ 1020.980122][T14571] Currently only 4K block size supported! [ 1020.991029][T14567] Mount JFS Failure: -22 [ 1021.012943][T14567] jfs_mount failed w/return code = -22 [ 1021.029432][T14571] Mount JFS Failure: -22 12:01:15 executing program 1: syz_open_dev$loop(&(0x7f0000000000), 0x6, 0x0) 12:01:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x3dd}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1021.061669][T14571] jfs_mount failed w/return code = -22 12:01:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x68, &(0x7f0000061000)) 12:01:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001060000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x7b000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010003f0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:15 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x48, &(0x7f0000000200)={0x3c, 0x1, '\x00', [@ra, @ra]}, 0x10) 12:01:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x3fa}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1021.257827][T14611] loop3: detected capacity change from 0 to 128 12:01:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x6c, &(0x7f0000061000)) [ 1021.346139][T14622] loop2: detected capacity change from 0 to 178 12:01:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x82010000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:15 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x2, 0x0, 0x0, 0x6}, 0x40) [ 1021.394702][T14629] loop4: detected capacity change from 0 to 178 [ 1021.409999][T14622] Currently only 4K block size supported! [ 1021.425677][T14629] Currently only 4K block size supported! [ 1021.432175][T14629] Mount JFS Failure: -22 [ 1021.436852][T14629] jfs_mount failed w/return code = -22 [ 1021.463046][T14622] Mount JFS Failure: -22 12:01:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x700}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1021.545201][T14622] jfs_mount failed w/return code = -22 12:01:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000400c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1021.634562][T14647] loop3: detected capacity change from 0 to 128 12:01:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x91020000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001068000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:15 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x5, @fixed}, 0xe) 12:01:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x74, &(0x7f0000061000)) [ 1021.768395][T14669] loop4: detected capacity change from 0 to 178 12:01:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xe00}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1021.823588][T14669] Currently only 4K block size supported! [ 1021.866564][T14669] Mount JFS Failure: -22 [ 1021.890793][T14677] loop2: detected capacity change from 0 to 178 [ 1021.907754][T14669] jfs_mount failed w/return code = -22 [ 1021.948830][T14689] loop3: detected capacity change from 0 to 128 12:01:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xa3020000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000480c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1021.994260][T14677] Currently only 4K block size supported! [ 1022.000235][T14677] Mount JFS Failure: -22 12:01:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000080)=@mangle={'mangle\x00', 0x1f, 0x6, 0x5b8, 0x500, 0x3e0, 0x5f0, 0x0, 0x2a0, 0x140, 0x5f0, 0x5f0, 0x5f0, 0x5f0, 0x6, 0x0, {[{{@uncond, 0x0, 0x118, 0x140, 0x0, {}, [@inet=@rpfilter={{0x28}}, @common=@hbh={{0x48}}]}, @inet=@TOS={0x28}}, {{@uncond, 0x0, 0xd8, 0x118, 0x0, {}, [@common=@srh={{0x30}}]}, @inet=@TPROXY1={0x40, 'TPROXY\x00', 0x1, {0x0, 0x0, @ipv4=@private}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@mcast2, @private2, [], [], 'ip_vti0\x00', 'batadv_slave_0\x00'}, 0x0, 0xa8, 0xd0}, @HL={0x28}}, {{@uncond, 0x0, 0xa8, 0xf0}, @DNPT={0x48, 'DNPT\x00', 0x0, {@ipv4=@remote, @ipv4=@dev}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x618) [ 1022.062093][T14677] jfs_mount failed w/return code = -22 12:01:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x1802}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x7a, &(0x7f0000061000)) 12:01:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000106c000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xa5020000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1022.204294][T14717] loop4: detected capacity change from 0 to 178 12:01:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x31, 0x0, 0x4) [ 1022.294580][T14717] Currently only 4K block size supported! [ 1022.321527][T14725] loop3: detected capacity change from 0 to 128 12:01:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xb4030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1022.342983][T14732] loop2: detected capacity change from 0 to 178 [ 1022.380266][T14717] Mount JFS Failure: -22 12:01:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x1903}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1022.409890][T14732] Currently only 4K block size supported! [ 1022.417590][T14717] jfs_mount failed w/return code = -22 [ 1022.443872][T14732] Mount JFS Failure: -22 12:01:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfe, &(0x7f0000061000)) 12:01:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000980)={0x0, 0x2, &(0x7f0000000000)=@raw=[@map_val], &(0x7f00000008c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 12:01:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xbe010000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1022.467308][T14732] jfs_mount failed w/return code = -22 12:01:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010004c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:16 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x8, 0x3, &(0x7f00000000c0)=@framed={{0x18, 0x0, 0x0, 0x0, 0x9}}, &(0x7f0000000100)='GPL\x00', 0x4, 0xe2, &(0x7f0000000140)=""/226, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 12:01:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x1a01}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001074000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xc1030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1022.620510][T14763] loop3: detected capacity change from 0 to 128 [ 1022.697728][T14773] loop4: detected capacity change from 0 to 178 [ 1022.728266][T14785] loop2: detected capacity change from 0 to 178 [ 1022.736984][T14773] Currently only 4K block size supported! 12:01:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xd6030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x1e03}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x300, &(0x7f0000061000)) [ 1022.742890][T14785] Currently only 4K block size supported! [ 1022.753859][T14785] Mount JFS Failure: -22 [ 1022.761812][T14785] jfs_mount failed w/return code = -22 [ 1022.779810][T14773] Mount JFS Failure: -22 12:01:16 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x7, 0x0, 0x0) 12:01:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000107a000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x4500}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1022.854071][T14773] jfs_mount failed w/return code = -22 [ 1022.957398][T14813] loop3: detected capacity change from 0 to 128 [ 1022.967817][T14815] loop2: detected capacity change from 0 to 178 [ 1022.990034][T14815] Currently only 4K block size supported! [ 1022.995654][T14813] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1023.000721][T14815] Mount JFS Failure: -22 12:01:17 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xd9020000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000600c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1023.010998][T14815] jfs_mount failed w/return code = -22 [ 1023.028175][T14813] Mount JFS Failure: -5 [ 1023.033405][T14813] jfs_mount failed w/return code = -5 12:01:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x4600}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:17 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000006c0)=ANY=[]) 12:01:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000030c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x500, &(0x7f0000061000)) 12:01:17 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xdd030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1023.274217][T14847] loop4: detected capacity change from 0 to 178 [ 1023.292672][T14850] FAT-fs (loop1): bogus number of reserved sectors [ 1023.330180][T14847] Currently only 4K block size supported! [ 1023.365436][T14847] Mount JFS Failure: -22 12:01:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x4d03}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1023.382188][T14850] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1023.426036][T14847] jfs_mount failed w/return code = -22 [ 1023.432542][T14859] loop3: detected capacity change from 0 to 128 [ 1023.440614][T14860] loop2: detected capacity change from 0 to 178 [ 1023.512473][T14860] Currently only 4K block size supported! [ 1023.518871][T14859] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:01:17 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='dots,dots,dots,dots,nodots,allow_utime=00000000000050400000000']) [ 1023.565400][T14860] Mount JFS Failure: -22 [ 1023.571394][T14859] Mount JFS Failure: -5 12:01:17 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xe1000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000680c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x5001}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1023.610423][T14859] jfs_mount failed w/return code = -5 [ 1023.618868][T14860] jfs_mount failed w/return code = -22 12:01:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000050c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x600, &(0x7f0000061000)) 12:01:17 executing program 1: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$BLKBSZGET(r0, 0xc0189436, 0x0) [ 1023.890397][T14902] loop4: detected capacity change from 0 to 178 [ 1023.926804][T14912] loop3: detected capacity change from 0 to 128 12:01:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x5203}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xf0000000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1023.937899][T14912] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1023.947312][T14912] Mount JFS Failure: -5 [ 1023.949063][T14902] Currently only 4K block size supported! [ 1023.951794][T14912] jfs_mount failed w/return code = -5 12:01:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xf4020000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1023.988800][T14916] loop2: detected capacity change from 0 to 178 12:01:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x700, &(0x7f0000061000)) [ 1024.033424][T14902] Mount JFS Failure: -22 [ 1024.050447][T14916] Currently only 4K block size supported! [ 1024.059670][T14916] Mount JFS Failure: -22 [ 1024.062973][T14902] jfs_mount failed w/return code = -22 [ 1024.064162][T14916] jfs_mount failed w/return code = -22 12:01:18 executing program 1: r0 = socket(0x11, 0x3, 0x0) sendmsg$IPVS_CMD_GET_DAEMON(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xb4}}, 0x0) 12:01:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x5c00}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0xfa030000, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1024.296791][T14947] loop3: detected capacity change from 0 to 128 12:01:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010006c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000060c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:18 executing program 1: syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000006c0)=ANY=[@ANYBLOB='dots']) [ 1024.349570][T14947] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1024.398466][T14947] Mount JFS Failure: -5 12:01:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x6a02}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1024.422944][T14947] jfs_mount failed w/return code = -5 12:01:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x2}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1024.480541][T14970] loop2: detected capacity change from 0 to 178 [ 1024.498029][T14969] FAT-fs (loop1): bogus number of reserved sectors [ 1024.519601][T14970] Currently only 4K block size supported! [ 1024.531141][T14975] loop4: detected capacity change from 0 to 178 [ 1024.538686][T14969] FAT-fs (loop1): Can't find a valid FAT filesystem [ 1024.555418][T14970] Mount JFS Failure: -22 [ 1024.560959][T14970] jfs_mount failed w/return code = -22 12:01:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x900, &(0x7f0000061000)) [ 1024.578620][T14975] Currently only 4K block size supported! 12:01:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x7b00}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1024.606961][T14975] Mount JFS Failure: -22 [ 1024.612331][T14975] jfs_mount failed w/return code = -22 [ 1024.646978][T14969] FAT-fs (loop1): bogus number of reserved sectors [ 1024.661831][T14969] FAT-fs (loop1): Can't find a valid FAT filesystem 12:01:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000740c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:18 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000180)) 12:01:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000070c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x8201}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1024.783324][T15006] loop3: detected capacity change from 0 to 128 [ 1024.797697][T15006] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1024.816019][T15006] Mount JFS Failure: -5 12:01:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x3}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1024.844565][T15006] jfs_mount failed w/return code = -5 12:01:18 executing program 1: syz_mount_image$msdos(0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000180)="f1", 0x1, 0xfffffffffffff801}], 0x0, 0x0) 12:01:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xa00, &(0x7f0000061000)) [ 1024.916727][T15015] loop4: detected capacity change from 0 to 178 [ 1024.927204][T15017] loop2: detected capacity change from 0 to 178 [ 1024.937654][T15015] Currently only 4K block size supported! [ 1024.960830][T15015] Mount JFS Failure: -22 12:01:19 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x9102}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1024.976283][T15017] Currently only 4K block size supported! [ 1024.987138][T15034] loop1: detected capacity change from 0 to 16376 [ 1025.033927][T15017] Mount JFS Failure: -22 [ 1025.038472][T15017] jfs_mount failed w/return code = -22 [ 1025.046806][T15015] jfs_mount failed w/return code = -22 [ 1025.047066][T15040] loop3: detected capacity change from 0 to 128 [ 1025.067099][T15040] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1025.074527][T15040] Mount JFS Failure: -5 [ 1025.079201][T15040] jfs_mount failed w/return code = -5 12:01:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x4}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010007a0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1025.168002][T15034] loop1: detected capacity change from 0 to 16376 12:01:19 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xa302}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000090c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xb00, &(0x7f0000061000)) 12:01:19 executing program 1: r0 = timerfd_create(0x7, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000080), &(0x7f00000000c0)) 12:01:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x7}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1025.278981][T15071] loop4: detected capacity change from 0 to 178 [ 1025.289558][T15071] Currently only 4K block size supported! [ 1025.296808][T15071] Mount JFS Failure: -22 [ 1025.301174][T15071] jfs_mount failed w/return code = -22 [ 1025.325436][T15070] loop3: detected capacity change from 0 to 128 12:01:19 executing program 1: r0 = fork() tkill(r0, 0xb) 12:01:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xe}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1025.408058][T15070] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1025.421814][T15086] loop2: detected capacity change from 0 to 178 12:01:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001016ae0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:19 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xa502}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1025.454089][T15086] Currently only 4K block size supported! [ 1025.460177][T15086] Mount JFS Failure: -22 [ 1025.473865][T15070] Mount JFS Failure: -5 [ 1025.478135][T15070] jfs_mount failed w/return code = -5 12:01:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x45}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1025.521081][T15086] jfs_mount failed w/return code = -22 12:01:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xc00, &(0x7f0000061000)) [ 1025.611173][T15111] loop4: detected capacity change from 0 to 178 [ 1025.691026][T15111] Currently only 4K block size supported! 12:01:19 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x4, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x401070c9, 0x0) 12:01:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x46}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1025.751664][T15111] Mount JFS Failure: -22 12:01:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000a0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:19 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xb403}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1025.826776][T15111] jfs_mount failed w/return code = -22 12:01:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001016af0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1025.895433][T15138] loop3: detected capacity change from 0 to 128 12:01:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x5c}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1025.946204][T15138] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1025.952613][T15138] Mount JFS Failure: -5 12:01:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0xc0189436, &(0x7f0000000080)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "c91b80dd0fc3bfbea26647153e965e2bb61a39ac4a6da33f6cea39e41294ac1c9884ff0f8a5e1bce8d18f2e41b6058b97f0f12770d3451fd0a08abcb61f4e047", "d7b320c205b402bf11b1d8439af4fed3c45262baeff4db838544a3216dda021d"}) [ 1026.019593][T15138] jfs_mount failed w/return code = -5 [ 1026.042970][T15147] loop2: detected capacity change from 0 to 178 [ 1026.140313][T15147] Currently only 4K block size supported! 12:01:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x400, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x0, "222a2ae43dd40536de92c1689cfd2835f83a7a16be2de2f506591ccbfa6ad39442be74a2b0b6ed9a078138acc346ebcce2ed9f53d73ee2efd29d9e6e8d40a554", "3494112b7eaf56eae7336f92dad70a299ce758f868f00d1a8906ef7fbaf406dac30f26f6ff9ca698ca4edfb06e078b283a24a3afaa366db6c653f2b89ea22550", "f412636df4f759049deb0852f78d00b3eb0b06a16ddc1a73130e4e42e92a722c"}) 12:01:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x7b}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1026.190756][T15147] Mount JFS Failure: -22 [ 1026.201083][T15167] loop4: detected capacity change from 0 to 178 [ 1026.207238][T15147] jfs_mount failed w/return code = -22 12:01:20 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xbe01}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xd00, &(0x7f0000061000)) 12:01:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1026.257609][T15167] Currently only 4K block size supported! [ 1026.286620][T15167] Mount JFS Failure: -22 [ 1026.292099][T15167] jfs_mount failed w/return code = -22 [ 1026.300271][T15177] loop_set_status: loop4 () has still dirty pages (nrpages=1) 12:01:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xe1}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x400, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x0, "222a2ae43dd40536de92c1689cfd2835f83a7a16be2de2f506591ccbfa6ad39442be74a2b0b6ed9a078138acc346ebcce2ed9f53d73ee2efd29d9e6e8d40a554", "3494112b7eaf56eae7336f92dad70a299ce758f868f00d1a8906ef7fbaf406dac30f26f6ff9ca698ca4edfb06e078b283a24a3afaa366db6c653f2b89ea22550", "f412636df4f759049deb0852f78d00b3eb0b06a16ddc1a73130e4e42e92a722c"}) 12:01:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001016b00c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1026.437815][T15188] loop2: detected capacity change from 0 to 178 [ 1026.454582][T15191] loop3: detected capacity change from 0 to 128 [ 1026.468161][T15191] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1026.477614][T15191] Mount JFS Failure: -5 [ 1026.482765][T15191] jfs_mount failed w/return code = -5 [ 1026.510605][T15188] Currently only 4K block size supported! 12:01:20 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xc103}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x400, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x0, "222a2ae43dd40536de92c1689cfd2835f83a7a16be2de2f506591ccbfa6ad39442be74a2b0b6ed9a078138acc346ebcce2ed9f53d73ee2efd29d9e6e8d40a554", "3494112b7eaf56eae7336f92dad70a299ce758f868f00d1a8906ef7fbaf406dac30f26f6ff9ca698ca4edfb06e078b283a24a3afaa366db6c653f2b89ea22550", "f412636df4f759049deb0852f78d00b3eb0b06a16ddc1a73130e4e42e92a722c"}) [ 1026.559586][T15188] Mount JFS Failure: -22 12:01:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xf0}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xf00, &(0x7f0000061000)) [ 1026.587537][T15188] jfs_mount failed w/return code = -22 [ 1026.622896][T15210] loop4: detected capacity change from 0 to 178 [ 1026.668649][T15210] Currently only 4K block size supported! 12:01:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000d0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x11a}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:20 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xd603}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1026.732343][T15210] Mount JFS Failure: -22 [ 1026.741693][T15210] jfs_mount failed w/return code = -22 [ 1026.747809][T15219] loop_set_status: loop4 () has still dirty pages (nrpages=1) [ 1026.758277][T15229] loop3: detected capacity change from 0 to 128 12:01:20 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x400, 0x0) ioctl$LOOP_SET_STATUS64(r0, 0x4c04, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x9c, 0x0, 0x0, 0x0, 0x0, "222a2ae43dd40536de92c1689cfd2835f83a7a16be2de2f506591ccbfa6ad39442be74a2b0b6ed9a078138acc346ebcce2ed9f53d73ee2efd29d9e6e8d40a554", "3494112b7eaf56eae7336f92dad70a299ce758f868f00d1a8906ef7fbaf406dac30f26f6ff9ca698ca4edfb06e078b283a24a3afaa366db6c653f2b89ea22550", "f412636df4f759049deb0852f78d00b3eb0b06a16ddc1a73130e4e42e92a722c"}) [ 1026.813399][T15233] loop2: detected capacity change from 0 to 178 [ 1026.824360][T15233] Currently only 4K block size supported! [ 1026.830547][T15233] Mount JFS Failure: -22 [ 1026.831658][T15229] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1026.835164][T15233] jfs_mount failed w/return code = -22 [ 1026.868799][T15229] Mount JFS Failure: -5 [ 1026.873476][T15229] jfs_mount failed w/return code = -5 12:01:20 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xd902}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001016b10c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000f0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x1020, &(0x7f0000061000)) 12:01:21 executing program 1: syz_usb_connect$printer(0x6, 0x2d, &(0x7f0000000000)=ANY=[], 0x0) 12:01:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x150}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1027.064657][T15262] loop2: detected capacity change from 0 to 178 [ 1027.092536][T15264] loop4: detected capacity change from 0 to 178 [ 1027.099316][T15267] loop3: detected capacity change from 0 to 128 12:01:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xdd03}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1027.114353][T15262] Currently only 4K block size supported! [ 1027.120529][T15262] Mount JFS Failure: -22 [ 1027.125932][T15262] jfs_mount failed w/return code = -22 [ 1027.135489][T15264] Currently only 4K block size supported! [ 1027.141430][T15264] Mount JFS Failure: -22 12:01:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x1100, &(0x7f0000061000)) 12:01:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001020100c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x182}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1027.251222][T15264] jfs_mount failed w/return code = -22 [ 1027.262013][T15290] loop3: detected capacity change from 0 to 128 12:01:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xe100}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1027.348419][T15298] loop2: detected capacity change from 0 to 178 12:01:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000ff0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x16a3, &(0x7f0000061000)) 12:01:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x1be}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1027.401879][T15298] Currently only 4K block size supported! [ 1027.427895][T15298] Mount JFS Failure: -22 [ 1027.432794][T15298] jfs_mount failed w/return code = -22 [ 1027.523685][T15317] loop4: detected capacity change from 0 to 178 [ 1027.558345][T15317] Currently only 4K block size supported! 12:01:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000110c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xf000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1027.574683][T15317] Mount JFS Failure: -22 [ 1027.580134][T15317] jfs_mount failed w/return code = -22 [ 1027.586113][T15326] loop3: detected capacity change from 0 to 128 12:01:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100fff0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:21 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x24, &(0x7f0000000100)=0xd9f3c8de5e68c481, 0x4) 12:01:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xf402}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x16ab, &(0x7f0000061000)) 12:01:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x218}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1027.765952][T15348] loop2: detected capacity change from 0 to 178 [ 1027.783178][T15348] Currently only 4K block size supported! [ 1027.798794][T15348] Mount JFS Failure: -22 [ 1027.857218][T15348] jfs_mount failed w/return code = -22 [ 1027.878054][T15356] loop3: detected capacity change from 0 to 128 12:01:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x26a}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1027.995712][T15361] loop4: detected capacity change from 0 to 178 12:01:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x16ad, &(0x7f0000061000)) [ 1028.069197][T15361] Currently only 4K block size supported! [ 1028.078038][T15361] Mount JFS Failure: -22 [ 1028.082854][T15361] jfs_mount failed w/return code = -22 12:01:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010a4160c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:22 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xfa03}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:22 executing program 1: openat$sysfs(0xffffffffffffff9c, &(0x7f00000000c0)='/sys/kernel/uevent_seqnum', 0x8300, 0x0) 12:01:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000007", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x291}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1028.280358][T15395] loop2: detected capacity change from 0 to 178 [ 1028.334644][T15396] loop3: detected capacity change from 0 to 128 [ 1028.360034][T15395] Currently only 4K block size supported! [ 1028.401862][T15407] loop4: detected capacity change from 0 to 178 [ 1028.411547][T15395] Mount JFS Failure: -22 [ 1028.416742][T15395] jfs_mount failed w/return code = -22 12:01:22 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x20000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:22 executing program 1: fork() wait4(0x0, 0x0, 0x0, 0x0) wait4(0x0, 0x0, 0x0, 0x0) [ 1028.488544][T15407] jfs_mount: Mount Failure: superblock is corrupt! [ 1028.498966][T15407] Mount JFS Failure: -22 [ 1028.503328][T15407] jfs_mount failed w/return code = -22 12:01:22 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x40000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x1f00, &(0x7f0000061000)) 12:01:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010a5160c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x2a3}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000b", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:22 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x1000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x2a5}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1028.726012][T15442] loop3: detected capacity change from 0 to 128 [ 1028.794814][T15453] loop4: detected capacity change from 0 to 178 [ 1028.813348][T15455] loop2: detected capacity change from 0 to 178 [ 1028.856351][T15455] Currently only 4K block size supported! [ 1028.877431][T15453] jfs_mount: Mount Failure: superblock is corrupt! [ 1028.893541][T15455] Mount JFS Failure: -22 [ 1028.899210][T15455] jfs_mount failed w/return code = -22 [ 1028.920173][T15453] Mount JFS Failure: -22 [ 1028.925162][T15453] jfs_mount failed w/return code = -22 12:01:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x2000, &(0x7f0000061000)) 12:01:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x2d9}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010a6160c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000020c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1029.170341][T15489] loop2: detected capacity change from 0 to 178 [ 1029.202355][T15492] loop3: detected capacity change from 0 to 128 [ 1029.213911][T15489] Currently only 4K block size supported! [ 1029.219847][T15489] Mount JFS Failure: -22 [ 1029.232474][T15489] jfs_mount failed w/return code = -22 [ 1029.232649][T15495] loop4: detected capacity change from 0 to 178 [ 1029.256890][T15495] Currently only 4K block size supported! [ 1029.271523][T15495] Mount JFS Failure: -22 [ 1029.278639][T15495] jfs_mount failed w/return code = -22 12:01:23 executing program 1: r0 = socket(0x11, 0x3, 0x0) io_setup(0x2, &(0x7f0000000bc0)=0x0) io_submit(r1, 0x1, &(0x7f0000000280)=[&(0x7f0000000100)={0x0, 0x0, 0x8, 0x0, 0x0, r0, 0x0}]) 12:01:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x2000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x2f4}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010001f0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x2010, &(0x7f0000061000)) 12:01:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000030c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1029.683375][T15527] loop4: detected capacity change from 0 to 178 [ 1029.693567][T15523] loop2: detected capacity change from 0 to 178 [ 1029.695387][T15522] loop3: detected capacity change from 0 to 128 [ 1029.703817][T15527] Currently only 4K block size supported! [ 1029.726372][T15523] Currently only 4K block size supported! [ 1029.744812][T15527] Mount JFS Failure: -22 [ 1029.750268][T15527] jfs_mount failed w/return code = -22 [ 1029.758539][T15523] Mount JFS Failure: -22 [ 1029.764775][T15523] jfs_mount failed w/return code = -22 12:01:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x3000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x300}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x2300, &(0x7f0000061000)) 12:01:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000040c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000200c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x319}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:24 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000380)={0x0, 0x200001ba, &(0x7f00000000c0)=@framed, &(0x7f0000000100)='GPL\x00', 0x0, 0xe2, &(0x7f0000000140)=""/226, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000040), 0x8, 0x10, 0x0}, 0x78) [ 1030.057913][T15564] loop3: detected capacity change from 0 to 128 12:01:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x3f00, &(0x7f0000061000)) 12:01:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x7000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1030.141560][T15570] loop4: detected capacity change from 0 to 178 [ 1030.180704][T15575] loop2: detected capacity change from 0 to 178 [ 1030.199036][T15575] Currently only 4K block size supported! [ 1030.213520][T15575] Mount JFS Failure: -22 [ 1030.219151][T15575] jfs_mount failed w/return code = -22 [ 1030.263438][T15570] Currently only 4K block size supported! 12:01:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001010200c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1030.325140][T15570] Mount JFS Failure: -22 12:01:24 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) sendmsg$inet(r0, &(0x7f00000002c0)={&(0x7f0000000140)={0x2, 0x4e24, @local}, 0x10, 0x0, 0x0, &(0x7f0000000480)=[@ip_retopts={{0x14, 0x0, 0x7, {[@timestamp_prespec={0x44, 0x4, 0xcc}]}}}], 0x18}, 0x0) 12:01:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x31e}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1030.355398][T15570] jfs_mount failed w/return code = -22 [ 1030.402535][T15594] loop3: detected capacity change from 0 to 128 12:01:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xe000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000050c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1030.500462][T15608] loop2: detected capacity change from 0 to 178 [ 1030.510882][T15608] Currently only 4K block size supported! [ 1030.524359][T15608] Mount JFS Failure: -22 [ 1030.528837][T15608] jfs_mount failed w/return code = -22 12:01:24 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000200), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x0) 12:01:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x34d}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x4000, &(0x7f0000061000)) 12:01:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000230c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x18020000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:24 executing program 1: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x2a, &(0x7f0000000100), 0x4) 12:01:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x352}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1030.755001][T15633] loop4: detected capacity change from 0 to 178 [ 1030.784969][T15636] loop2: detected capacity change from 0 to 178 [ 1030.840724][T15642] loop3: detected capacity change from 0 to 128 [ 1030.846806][T15636] Currently only 4K block size supported! [ 1030.847797][T15633] Currently only 4K block size supported! [ 1030.859551][T15633] Mount JFS Failure: -22 [ 1030.862210][T15636] Mount JFS Failure: -22 [ 1030.866859][T15633] jfs_mount failed w/return code = -22 12:01:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x19030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1030.891447][T15642] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1030.914475][T15636] jfs_mount failed w/return code = -22 [ 1030.936451][T15642] Mount JFS Failure: -5 [ 1030.940811][T15642] jfs_mount failed w/return code = -5 12:01:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000060c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000360c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:25 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x3b4}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:25 executing program 1: mount$9p_fd(0x1000000, &(0x7f0000000280)='.\x00', &(0x7f00000002c0), 0x0, 0x0) 12:01:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x4800, &(0x7f0000061000)) 12:01:25 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x1a010000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1031.139496][T15679] 9pnet_virtio: no channels available for device [ 1031.173137][T15679] 9pnet_virtio: no channels available for device [ 1031.183499][T15683] loop4: detected capacity change from 0 to 178 12:01:25 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x3c1}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$sock_timeval(r0, 0x1, 0x2d, 0x0, &(0x7f0000000040)) [ 1031.239515][T15689] loop2: detected capacity change from 0 to 178 [ 1031.247209][T15690] loop3: detected capacity change from 0 to 128 [ 1031.258141][T15683] Currently only 4K block size supported! [ 1031.291501][T15690] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1031.304417][T15690] Mount JFS Failure: -5 [ 1031.306179][T15683] Mount JFS Failure: -22 [ 1031.310219][T15690] jfs_mount failed w/return code = -5 [ 1031.330685][T15689] Currently only 4K block size supported! 12:01:25 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x3d6}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1031.357894][T15683] jfs_mount failed w/return code = -22 12:01:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x4c00, &(0x7f0000061000)) 12:01:25 executing program 1: prctl$PR_SET_MM_AUXV(0x1a, 0xc, 0x0, 0x0) [ 1031.398506][T15689] Mount JFS Failure: -22 [ 1031.402958][T15689] jfs_mount failed w/return code = -22 12:01:25 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x1e030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000070c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000370c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:25 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x45000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1031.667144][T15737] loop3: detected capacity change from 0 to 128 [ 1031.673693][T15736] loop2: detected capacity change from 0 to 178 [ 1031.692361][T15734] loop4: detected capacity change from 0 to 178 [ 1031.710957][T15736] Currently only 4K block size supported! 12:01:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0xf0}, 0x0) [ 1031.719810][T15737] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1031.720694][T15734] Currently only 4K block size supported! [ 1031.748880][T15736] Mount JFS Failure: -22 [ 1031.758431][T15734] Mount JFS Failure: -22 [ 1031.759059][T15737] Mount JFS Failure: -5 12:01:25 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x3dd}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1031.779052][T15736] jfs_mount failed w/return code = -22 [ 1031.785635][T15734] jfs_mount failed w/return code = -22 [ 1031.793654][T15737] jfs_mount failed w/return code = -5 12:01:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000380c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000080c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x46000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x6000, &(0x7f0000061000)) 12:01:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x3fa}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:26 executing program 1: r0 = eventfd2(0x0, 0x0) ioctl$EXT4_IOC_GROUP_EXTEND(r0, 0x541b, 0x0) [ 1032.063702][T15780] loop2: detected capacity change from 0 to 178 [ 1032.088320][T15781] loop4: detected capacity change from 0 to 178 12:01:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x700}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x4d030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1032.112652][T15781] Currently only 4K block size supported! [ 1032.130214][T15785] loop3: detected capacity change from 0 to 128 [ 1032.132840][T15780] Currently only 4K block size supported! [ 1032.172326][T15781] Mount JFS Failure: -22 12:01:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x50010000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:26 executing program 1: prctl$PR_SET_MM_AUXV(0x23, 0xd, &(0x7f0000000200)='e', 0x1) [ 1032.193011][T15780] Mount JFS Failure: -22 [ 1032.207802][T15781] jfs_mount failed w/return code = -22 [ 1032.224084][T15780] jfs_mount failed w/return code = -22 12:01:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x6800, &(0x7f0000061000)) 12:01:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000090c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010003f0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x52030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xe00}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:26 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000bc0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16, @ANYBLOB="01"], 0x2c}}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000080), r0) syz_genetlink_get_family_id$batadv(&(0x7f0000000240), r0) [ 1032.484839][T15836] loop2: detected capacity change from 0 to 178 [ 1032.498714][T15834] loop3: detected capacity change from 0 to 128 [ 1032.506942][T15839] loop4: detected capacity change from 0 to 178 [ 1032.516623][T15836] Currently only 4K block size supported! 12:01:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x5c000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1032.544155][T15836] Mount JFS Failure: -22 12:01:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x1802}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1032.580546][T15839] Currently only 4K block size supported! [ 1032.592805][T15836] jfs_mount failed w/return code = -22 [ 1032.618560][T15839] Mount JFS Failure: -22 12:01:26 executing program 1: r0 = socket$unix(0x1, 0x1, 0x0) sendmmsg(r0, &(0x7f0000002300)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000001640)=[{0x10}], 0x10}}], 0x1, 0x0) 12:01:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x6c00, &(0x7f0000061000)) [ 1032.641471][T15839] jfs_mount failed w/return code = -22 12:01:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000a0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000400c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x6a020000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1032.832705][T15876] loop3: detected capacity change from 0 to 128 12:01:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x7400, &(0x7f0000061000)) 12:01:26 executing program 1: r0 = io_uring_setup(0x4e7a, &(0x7f0000000180)) io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(r0, 0x9, &(0x7f0000000040), 0x1) 12:01:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x1903}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1032.918350][T15882] loop2: detected capacity change from 0 to 178 [ 1032.936187][T15882] Currently only 4K block size supported! [ 1032.942038][T15882] Mount JFS Failure: -22 [ 1032.955836][T15888] loop4: detected capacity change from 0 to 178 12:01:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x7b000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1032.979462][T15882] jfs_mount failed w/return code = -22 [ 1032.988925][T15888] Currently only 4K block size supported! [ 1032.995101][T15888] Mount JFS Failure: -22 [ 1032.999920][T15888] jfs_mount failed w/return code = -22 [ 1033.051365][T15898] loop3: detected capacity change from 0 to 128 12:01:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000480c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:27 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$ETHTOOL_MSG_FEATURES_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}, 0x1, 0x0, 0x2}, 0x0) 12:01:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x1a01}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x82010000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x7a00, &(0x7f0000061000)) 12:01:27 executing program 1: r0 = socket$can_bcm(0x1d, 0x2, 0x2) getsockopt$sock_timeval(r0, 0x10e, 0x0, 0x0, 0x0) [ 1033.267302][T15927] loop4: detected capacity change from 0 to 178 [ 1033.289777][T15927] Currently only 4K block size supported! [ 1033.301309][T15927] Mount JFS Failure: -22 [ 1033.310233][T15927] jfs_mount failed w/return code = -22 [ 1033.324647][T15934] loop2: detected capacity change from 0 to 178 [ 1033.341058][T15943] loop3: detected capacity change from 0 to 128 [ 1033.365862][T15934] Currently only 4K block size supported! 12:01:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x1e03}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000d0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:27 executing program 1: sendmsg$IEEE802154_LLSEC_ADD_DEV(0xffffffffffffffff, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) clone3(&(0x7f0000000500)={0x40000100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) clone3(&(0x7f0000002a80)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000002a40)=[0x0], 0x1}, 0x58) clone3(&(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, {}, &(0x7f0000000280)=""/36, 0x24, 0x0, 0x0}, 0x58) [ 1033.430813][T15934] Mount JFS Failure: -22 [ 1033.444109][T15934] jfs_mount failed w/return code = -22 12:01:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x91020000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xa316, &(0x7f0000061000)) 12:01:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010004c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x4500}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1033.611085][T15972] loop4: detected capacity change from 0 to 178 [ 1033.637055][T15972] Currently only 4K block size supported! [ 1033.655484][T15972] Mount JFS Failure: -22 [ 1033.661473][T15972] jfs_mount failed w/return code = -22 [ 1033.697618][T15988] loop2: detected capacity change from 0 to 178 12:01:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x4600}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xa3020000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000f0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1033.717463][T15985] loop3: detected capacity change from 0 to 128 [ 1033.720881][T15988] Currently only 4K block size supported! [ 1033.734664][T15988] Mount JFS Failure: -22 [ 1033.740471][T15988] jfs_mount failed w/return code = -22 12:01:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000600c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xab16, &(0x7f0000061000)) 12:01:28 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xa5020000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:28 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x4d03}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1034.014033][T16053] loop4: detected capacity change from 0 to 178 [ 1034.101412][T16074] loop3: detected capacity change from 0 to 128 [ 1034.115375][T16069] loop2: detected capacity change from 0 to 178 [ 1034.131807][T16053] Currently only 4K block size supported! [ 1034.197366][T16069] Currently only 4K block size supported! [ 1034.233118][T16053] Mount JFS Failure: -22 [ 1034.266734][T16053] jfs_mount failed w/return code = -22 [ 1034.288094][T16069] Mount JFS Failure: -22 [ 1034.297964][T16069] jfs_mount failed w/return code = -22 12:01:32 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$netlbl_unlabel(&(0x7f0000000640), r0) sendmsg$NLBL_UNLABEL_C_STATICLISTDEF(r0, &(0x7f0000000780)={0x0, 0x0, &(0x7f0000000740)={&(0x7f0000000680)={0x14, r1, 0x82ce7eae1a8d4d3}, 0x14}}, 0x0) 12:01:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xad16, &(0x7f0000061000)) 12:01:32 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x5001}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000680c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xb4030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000100c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1038.769460][T16131] loop4: detected capacity change from 0 to 178 [ 1038.777832][T16134] loop2: detected capacity change from 0 to 178 [ 1038.798592][T16136] loop3: detected capacity change from 0 to 128 [ 1038.810676][T16131] Currently only 4K block size supported! [ 1038.897382][T16131] Mount JFS Failure: -22 [ 1038.902779][T16134] Currently only 4K block size supported! 12:01:33 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000240)={0x18, r1, 0x200fbda9a786afff, 0x0, 0x0, {}, [@HEADER={0x4}]}, 0x18}}, 0x0) 12:01:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xbe010000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1038.948518][T16131] jfs_mount failed w/return code = -22 [ 1038.969775][T16134] Mount JFS Failure: -22 12:01:33 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x5203}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1039.026195][T16134] jfs_mount failed w/return code = -22 12:01:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xedc0, &(0x7f0000061000)) 12:01:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000110c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010006c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:33 executing program 1: prctl$PR_SET_MM_AUXV(0xe, 0xc, 0x0, 0x0) 12:01:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xc1030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:33 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x5c00}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1039.256508][T16175] loop3: detected capacity change from 0 to 128 [ 1039.310407][T16179] loop2: detected capacity change from 0 to 178 [ 1039.324490][T16179] Currently only 4K block size supported! [ 1039.330621][T16179] Mount JFS Failure: -22 [ 1039.335791][T16179] jfs_mount failed w/return code = -22 12:01:33 executing program 1: r0 = socket(0x1, 0x5, 0x0) sendmsg$SEG6_CMD_DUMPHMAC(r0, &(0x7f0000000040)={0x0, 0x0, 0xfffffffffffffffc}, 0x0) [ 1039.355656][T16188] loop4: detected capacity change from 0 to 178 [ 1039.386432][T16188] Currently only 4K block size supported! [ 1039.392660][T16188] Mount JFS Failure: -22 [ 1039.398378][T16188] jfs_mount failed w/return code = -22 12:01:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000740c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xd6030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfeff, &(0x7f0000061000)) 12:01:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010001e0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:33 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x6a02}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:33 executing program 1: prctl$PR_SET_MM_AUXV(0x19, 0xc, 0x0, 0x0) [ 1039.610418][T16217] loop3: detected capacity change from 0 to 128 [ 1039.648941][T16219] loop2: detected capacity change from 0 to 178 12:01:33 executing program 1: mremap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x2000, 0x3, &(0x7f0000ff9000/0x2000)=nil) 12:01:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xd9020000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1039.715106][T16219] Currently only 4K block size supported! [ 1039.731504][T16219] Mount JFS Failure: -22 [ 1039.735986][T16219] jfs_mount failed w/return code = -22 [ 1039.753447][T16231] loop4: detected capacity change from 0 to 178 12:01:33 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x7b00}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xff00, &(0x7f0000061000)) 12:01:33 executing program 1: r0 = socket$xdp(0x2c, 0x3, 0x0) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f0000000100)={'batadv0\x00', 0x0}) bind$xdp(r0, &(0x7f0000000140)={0x2c, 0x0, r2}, 0x10) 12:01:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xdd030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010007a0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1039.863816][T16231] Currently only 4K block size supported! [ 1039.869572][T16231] Mount JFS Failure: -22 [ 1039.887420][T16253] loop3: detected capacity change from 0 to 128 [ 1039.907422][T16231] jfs_mount failed w/return code = -22 12:01:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xff0f, &(0x7f0000061000)) 12:01:34 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x8201}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000230c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:34 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000001180)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) [ 1040.118014][T16275] loop2: detected capacity change from 0 to 178 12:01:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xe1000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1040.159097][T16275] Currently only 4K block size supported! [ 1040.203036][T16275] Mount JFS Failure: -22 [ 1040.209653][T16284] loop3: detected capacity change from 0 to 128 [ 1040.225457][T16275] jfs_mount failed w/return code = -22 [ 1040.227397][T16289] loop4: detected capacity change from 0 to 178 12:01:34 executing program 1: pipe(&(0x7f0000003900)={0xffffffffffffffff}) ioctl$sock_bt_hci(r0, 0x40086602, &(0x7f0000000000)="02766c17") [ 1040.260962][T16289] Currently only 4K block size supported! [ 1040.270323][T16289] Mount JFS Failure: -22 [ 1040.275431][T16289] jfs_mount failed w/return code = -22 12:01:34 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x9102}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000480c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001016a40c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xf0000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfffe, &(0x7f0000061000)) 12:01:34 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet6(r0, &(0x7f0000000500)={&(0x7f0000000040)={0xa, 0x4e21, 0x5, @private0}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000080)="00e77b60d2c84d91aa17a4de2ed244d897fc3c07522588f8bddf2c", 0x1b}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="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"], 0x40}, 0x41) [ 1040.491151][T16319] loop4: detected capacity change from 0 to 178 [ 1040.504528][T16319] Currently only 4K block size supported! [ 1040.511882][T16319] Mount JFS Failure: -22 [ 1040.518862][T16319] jfs_mount failed w/return code = -22 [ 1040.535200][T16330] loop2: detected capacity change from 0 to 178 12:01:34 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000680)={&(0x7f0000000280)={0x2, 0x4e21, 0x0, @mcast1}, 0x1c, 0x0}, 0xbb8) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_START_NAN(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) r2 = socket$netlink(0x10, 0x3, 0x8) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r1, 0x8933, &(0x7f00000013c0)={'batadv0\x00', 0x0}) pipe(&(0x7f0000003900)={0xffffffffffffffff}) ioctl$sock_bt_bnep_BNEPCONNADD(r4, 0x400442c8, 0x0) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_JOIN_MESH(r5, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="010000000000000000004400000008000300", @ANYRES32=0x0, @ANYBLOB="0400cc000800000380"], 0x28}}, 0x0) r7 = socket$nl_generic(0x10, 0x3, 0x10) r8 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) r9 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r9, 0x89f1, &(0x7f00000012c0)={'ip_vti0\x00', &(0x7f0000001240)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x4, 0x0, @remote, @loopback}}}}) ioctl$sock_SIOCGIFINDEX_80211(r7, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_JOIN_MESH(r7, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000240)={0x44, r8, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r10}, @void}}, [@NL80211_ATTR_SOCKET_OWNER={0x4}, @NL80211_ATTR_MESH_CONFIG={0x24, 0x23, 0x0, 0x1, [@NL80211_MESHCONF_RETRY_TIMEOUT={0x6, 0x1, 0x32}, @NL80211_MESHCONF_MAX_RETRIES={0x5}, @NL80211_MESHCONF_TTL={0x5, 0x6, 0x3f}, @NL80211_MESHCONF_FORWARDING={0x5}]}]}, 0x44}}, 0x0) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r4, &(0x7f00000002c0)={&(0x7f0000000180), 0xc, &(0x7f0000000240)={&(0x7f00000001c0)={0x58, r6, 0x2, 0x70bd27, 0x25dfdbfe, {{}, {@val={0x8, 0x3, r10}, @val={0xc, 0x99, {0x2, 0x74a}}}}, [@NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x3}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0xdb105f0f1632096a}, @NL80211_ATTR_CRIT_PROT_ID={0x6}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0x79c}, @NL80211_ATTR_CRIT_PROT_ID={0x6, 0xb3, 0x2}, @NL80211_ATTR_MAX_CRIT_PROT_DURATION={0x6, 0xb4, 0xd68}]}, 0x58}, 0x1, 0x0, 0x0, 0x24040000}, 0x4000010) sendmsg$ETHTOOL_MSG_WOL_GET(r2, &(0x7f0000001600)={&(0x7f0000000b00)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f00000015c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="311bdb7de0aeaa3c1dac107426435c4772bc4ad13ee428baca04f7595982ecd992dbb0df16bba1e5310cdb775c2d31ac531bf7eb621aba848c6e685a8005edeb3f5a2b5dc808f10d2e62d2885665281fc0a988c3d27a2abfc74a9692418e8dbda0f6dad347ca432329a949bb5600000000", @ANYRES16=0x0, @ANYBLOB="02002dbd7000fedbdf25090000006000018008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000100000008000100", @ANYRES32=0x0, @ANYBLOB="080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="0800030006000000080003000000000014000200726f7365300000000000000000000000080003000300000074000180140002006e72300000000000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="140002006d6163766c616e300000000000000000140002006970766c616e3000000000000000000008000100", @ANYRES32=0x0, @ANYBLOB="08000300030000001400020076657468305f6d616376746170000000200001801400020076657468305f746f5f687372000000000800030001000000340001801400020076657468305f766c616e000000000000080003000100000014000200697036746e6c300000000000000000001400018008000100", @ANYRES32=0x0, @ANYBLOB="08000300000000006c0001800800030001000000140002006272696467655f736c6176655f310000080003000200000008000100", @ANYRES32=0x0, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="080003000300000008000100", @ANYRES32=r3, @ANYBLOB="0800030002000000080003000300000014000200626f6e645f736c6176655f3000000000"], 0x1bc}}, 0x800) setsockopt$packet_drop_memb(0xffffffffffffffff, 0x107, 0x2, &(0x7f0000000000)={r3, 0x1, 0x6, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}}, 0x10) 12:01:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xf4020000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1040.567735][T16333] loop3: detected capacity change from 0 to 128 12:01:34 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xa302}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1040.630086][T16330] Currently only 4K block size supported! 12:01:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x200000, &(0x7f0000061000)) [ 1040.680328][T16330] Mount JFS Failure: -22 12:01:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010004c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1040.736625][T16330] jfs_mount failed w/return code = -22 12:01:34 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xa502}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xfa030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001016a50c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1040.899762][T16360] loop3: detected capacity change from 0 to 128 12:01:35 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8932, &(0x7f0000000000)={'ip6gretap0\x00', @ifru_names}) [ 1040.943633][T16360] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1040.955313][T16370] loop4: detected capacity change from 0 to 178 12:01:35 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xb403}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x2000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1040.984153][T16360] Mount JFS Failure: -5 [ 1040.988949][T16360] jfs_mount failed w/return code = -5 [ 1041.001110][T16378] loop2: detected capacity change from 0 to 178 [ 1041.010443][T16370] Currently only 4K block size supported! [ 1041.089210][T16370] Mount JFS Failure: -22 [ 1041.094784][T16370] jfs_mount failed w/return code = -22 12:01:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x4000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1041.139697][T16378] Currently only 4K block size supported! 12:01:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x400000, &(0x7f0000061000)) 12:01:35 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xbe01}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1041.199911][T16378] Mount JFS Failure: -22 12:01:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000600c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:35 executing program 1: r0 = socket(0x2a, 0x2, 0x0) sendmsg$xdp(r0, &(0x7f00000003c0)={0x0, 0x0, 0x0}, 0x0) [ 1041.223931][T16378] jfs_mount failed w/return code = -22 12:01:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001016a60c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1041.318274][T16415] loop3: detected capacity change from 0 to 128 [ 1041.337215][T16415] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1041.344210][T16415] Mount JFS Failure: -5 [ 1041.348955][T16415] jfs_mount failed w/return code = -5 12:01:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @local, 0x4}, 0x1c) 12:01:35 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xc103}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1041.431654][T16431] loop4: detected capacity change from 0 to 178 [ 1041.460965][T16436] loop2: detected capacity change from 0 to 178 [ 1041.468995][T16431] Currently only 4K block size supported! 12:01:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x100000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x80ffff, &(0x7f0000061000)) [ 1041.479461][T16431] Mount JFS Failure: -22 [ 1041.484013][T16436] Currently only 4K block size supported! [ 1041.489849][T16431] jfs_mount failed w/return code = -22 [ 1041.499418][T16436] Mount JFS Failure: -22 [ 1041.524545][T16436] jfs_mount failed w/return code = -22 12:01:35 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xd603}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000ff0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000680c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x200000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1041.650033][T16459] loop3: detected capacity change from 0 to 128 12:01:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xe0ffff, &(0x7f0000061000)) [ 1041.767890][T16468] loop4: detected capacity change from 0 to 178 [ 1041.782020][T16470] loop2: detected capacity change from 0 to 178 [ 1041.802353][T16468] Currently only 4K block size supported! 12:01:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x300000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:35 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xd902}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1041.853151][T16468] Mount JFS Failure: -22 [ 1041.857647][T16468] jfs_mount failed w/return code = -22 [ 1041.876760][T16470] Currently only 4K block size supported! [ 1041.934705][T16470] Mount JFS Failure: -22 12:01:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010006c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1041.959126][T16470] jfs_mount failed w/return code = -22 [ 1042.009811][T16491] loop3: detected capacity change from 0 to 128 [ 1042.083353][T16511] loop4: detected capacity change from 0 to 178 [ 1042.101861][T16511] Currently only 4K block size supported! [ 1042.108847][T16511] Mount JFS Failure: -22 [ 1042.114946][T16511] jfs_mount failed w/return code = -22 12:01:36 executing program 1: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) sendmsg$inet6(r0, &(0x7f0000000500)={&(0x7f0000000040)={0xa, 0x0, 0x0, @private0}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000080)='\x00', 0x1}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB='@'], 0x40}, 0x41) 12:01:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x700000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:36 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xdd03}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100fff0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000740c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x1000000, &(0x7f0000061000)) [ 1042.545480][T16530] loop4: detected capacity change from 0 to 178 [ 1042.547452][T16531] loop2: detected capacity change from 0 to 178 [ 1042.566887][T16535] loop3: detected capacity change from 0 to 128 12:01:36 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xe100}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xe00000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1042.607998][T16531] Currently only 4K block size supported! [ 1042.614945][T16535] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1042.621287][T16530] Currently only 4K block size supported! [ 1042.622330][T16531] Mount JFS Failure: -22 [ 1042.632809][T16531] jfs_mount failed w/return code = -22 [ 1042.666990][T16535] Mount JFS Failure: -5 [ 1042.671538][T16535] jfs_mount failed w/return code = -5 [ 1042.678082][T16530] Mount JFS Failure: -22 [ 1042.685425][T16530] jfs_mount failed w/return code = -22 12:01:36 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmsg$inet6(r0, &(0x7f0000000240)={&(0x7f0000000000)={0xa, 0x4e21, 0x0, @mcast1}, 0x1c, &(0x7f0000000440)=[{&(0x7f0000000040)="9f124e08161690a66764467b3adc8799e5090f8b8843a860d0ddccee67dc8fe4ee73ff1878742760c0d9b0", 0x2b}, {&(0x7f0000000080)="386e415909206f523d501d67e131eda290d4f5d59230146a2ffca1c8a311dd95", 0x20}, {&(0x7f00000000c0)="5eff1a37126bfbb54818918763fb1c8291abcf08e152", 0x16}, {&(0x7f0000000140)="9af22e69b836fe399d81d4a30fd2fc30d424f31d9a23b3e226972c90073cdda3f2447cd1bb957a2dfc7f9792ff6719812457021fbb85df8851234787bc387fc4352a6e9937f9bec090b18497cb52a9adca6aebcb3c897831bc532e83bc471f0cec092da00c8f794e039d8d16dd975a", 0x6f}, {&(0x7f00000001c0)="37a69f19b5ffedf37041e140c2edfee2ab9a81fd8054d8427738a4a1f916a7a35d0a298ac304cf0bb24631c044e66f5bcd09f3547a48ade09d2570d70faf0245118c3747da3b30b5e208e8c8a4b5de07d5b58dd9fa7674e97a6397c11e1df0f3708ea89ead823f858aeae36d0e811f3de2", 0x71}, {&(0x7f00000002c0)="e489de2d7c2492e0fc4ada59b888ffd5de0fa6c6b79df1ebcd148a4c644a08811593e5092b8b2528936820abad4b05bc21c82db137e66e98bbb32c6de818e3452354e0b224746f975ae69c0b9260f9baeda77aa03836f389f2b24c7f6fc6c73869863fb2414b4fab75df916384b0da021118751d", 0x74}, {&(0x7f0000000340)="40a5510baba3410a13b60f020a90def885819bc9d479f761ef3116d44a28f13934e6d76e4dc8da5138a058c2a375f5238d99bac3774383cda0b665b2fe5169be72602488244872de310bb927030af8a9260e9d1ae68715891bfa3026d0217d60e905e304d621641157ce35001bea1eea3f074818374fdc0ed351f9feac08a702a90f2634068416f50ce429bc1b0c24cfed7c990962e543c69541d3f1babd601206e015c34f801949d986e5de59e6ef0c3245d634fa9ea19b25e8f6c4d2abbc601bfd26983516dd48a684c4d90b477c1885f6bacd637f5314998d3ce668152090f22905b6a5ece41fe7cf024151", 0xed}, {&(0x7f00000006c0)="9e30e2636e07792a0ae3c504ff1f724ec81b0fd2c0cc3ce6d83cae9949c1cc08e9707975fec83e65bef5dda62e9b981ad62874e045a6358ddc1c2e966cdd285953b60b2f716c836030c0f17b0a2b312da352cee432117a7d8b61471736951dbc681f2b8f73ef85fb5762c70d5686c740c933faa6488694a5036afeceb4e7ff14bab610553c7cc07dc657bb28705ccc5fac2d052bc4d2d0da8e27293b76e5ac49fcbfb6ca9111aea1b910b3346f623ee513d3ebf5d76cd99840deeeb38edf2e3721b5e25bd5dbb7612314b69ac061ceb7b1e824de0aaf2c7b959c5ce03f36427d7e39ed1908c3be7bf529c44964f52ae9260615f8b05a37c7f8226b6a628ca8008d3c035f6f2decb9fef676c8f9ee04a902b3bb2ec7b90ffa3f9dc9ce2f8b459ae2303bbb7f0bd1f907a16a60d1302f64c49c9de65d17ab838812d68fcba20a2f74bdc57f72a5a0ef7a8497cfcfa2d1b24b05038b9f3733bbcab700a4bc567bdda383e33168e3ec7d8ea4d664d46d825d61ba2bd633b5f998b16765d19d347f4cc165fccf203fe883d71a3e49f6a52133fb92255d1d17cef81e1e195f9d658059f866f17d6e489f7191f4da288de0a41eaa2148da1303f0dfac7338b73e670c65f3b0eed17cedf5f4937105bfd50b3f173c05bab87c39ec0f2f5814d185df4b0ebff9005b2de7bdffcc8e9b09e8e638ec8da46df39e1fb9ca5f1ee6df5688c51765c01077ddf420cd08cb132527c29eafe0a20052df8976c53fe4d4cfafe8fb37eed8e7b5cc695434e336629c7aeceb609709c970d15d53787dcc7a75a74d48b45b7e6a0166b12c4411c4f83ea4ec33fc587a736a6c57c587be7dc6e8e28dd66fe22d68719218623e9f90bbffc42fa443f8b355a4fea5c9c4b93d3e2026a0766ccedb2f299e711bb88e8e0e936c364f55753546427555cdc5a006b0aa261efe74ea06c196caa177ffb9109a248acf9324abc74a238fe9c52bd2d80b10beab9c0c3ed5b0bcca98fe474273808f3e05a7d598ee5736581092f95f913fb9a6d420face4d5af6353cb7b366ea80842e513ef83bc524c42dfdc14c27f5ca11ee952f34ac436ffe054cc072db1352", 0x30b}], 0x8}, 0x0) 12:01:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000007", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x2000000, &(0x7f0000061000)) 12:01:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010007a0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:36 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xf000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x1802000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1042.918213][T16578] loop4: detected capacity change from 0 to 178 [ 1042.932696][T16576] loop2: detected capacity change from 0 to 178 [ 1042.955749][T16580] loop3: detected capacity change from 0 to 128 [ 1042.956606][T16578] Currently only 4K block size supported! [ 1042.968471][T16578] Mount JFS Failure: -22 [ 1042.982457][T16578] jfs_mount failed w/return code = -22 12:01:37 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000002c0)={0x12, 0x10001, 0x0, 0x6}, 0x40) [ 1043.031024][T16580] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1043.072127][T16576] jfs_mount: Mount Failure: superblock is corrupt! 12:01:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x1903000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xf402}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1043.121385][T16580] Mount JFS Failure: -5 [ 1043.133885][T16580] jfs_mount failed w/return code = -5 [ 1043.142705][T16576] Mount JFS Failure: -22 [ 1043.156147][T16576] jfs_mount failed w/return code = -22 12:01:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000014", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000b", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x3000000, &(0x7f0000061000)) 12:01:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x1a01000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:37 executing program 1: sendmsg$NFT_MSG_GETSET(0xffffffffffffffff, &(0x7f0000001700)={0x0, 0x0, 0x0}, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001580)) 12:01:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xfa03}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1043.397013][T16615] loop4: detected capacity change from 0 to 178 [ 1043.429173][T16615] jfs_mount: Mount Failure: superblock is corrupt! 12:01:37 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$sock_bt_hci(r0, 0x89a0, &(0x7f00000002c0)="e4") pipe(0x0) ioctl$sock_bt_bnep_BNEPCONNADD(0xffffffffffffffff, 0x400442c8, 0x0) openat$cgroup_subtree(0xffffffffffffffff, 0x0, 0x2, 0x0) pipe(0x0) bpf$BPF_GET_BTF_INFO(0xf, &(0x7f0000000340)={0xffffffffffffffff, 0x10, &(0x7f0000000300)={&(0x7f00000001c0)=""/250, 0xfa, 0x0}}, 0x10) bpf$PROG_LOAD(0x5, &(0x7f0000000380)={0x0, 0xe, &(0x7f0000000540)=ANY=[], 0x0, 0x0, 0x0, 0x0, 0x41100, 0xb, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000140)={0x8, 0x4}, 0x8, 0x10, &(0x7f0000000180)={0x3, 0xb, 0x81, 0x6}, 0x10, r1}, 0x78) [ 1043.475900][T16615] Mount JFS Failure: -22 [ 1043.480446][T16615] jfs_mount failed w/return code = -22 [ 1043.490970][T16623] loop2: detected capacity change from 0 to 178 12:01:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x1e03000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x20000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1043.551133][T16623] jfs_mount: Mount Failure: superblock is corrupt! [ 1043.570549][T16623] Mount JFS Failure: -22 [ 1043.575446][T16623] jfs_mount failed w/return code = -22 [ 1043.576882][T16636] loop3: detected capacity change from 0 to 128 12:01:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000017", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000020c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x40000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1043.724736][T16636] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1043.790356][T16636] Mount JFS Failure: -5 12:01:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x4500000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1043.832780][T16636] jfs_mount failed w/return code = -5 [ 1043.853186][T16666] loop2: detected capacity change from 0 to 178 12:01:37 executing program 1: syz_genetlink_get_family_id$ethtool(0xffffffffffffffff, 0xffffffffffffffff) [ 1043.879146][T16666] Currently only 4K block size supported! [ 1043.885408][T16666] Mount JFS Failure: -22 [ 1043.889661][T16666] jfs_mount failed w/return code = -22 [ 1043.896997][T16668] loop4: detected capacity change from 0 to 178 [ 1043.941121][T16668] jfs_mount: Mount Failure: superblock is corrupt! [ 1043.948226][T16668] Mount JFS Failure: -22 [ 1043.952852][T16668] jfs_mount failed w/return code = -22 12:01:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x4000000, &(0x7f0000061000)) 12:01:38 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x1000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:38 executing program 1: bpf$BPF_GET_MAP_INFO(0xf, &(0x7f00000000c0)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 12:01:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x4600000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000001f", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000030c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:38 executing program 1: r0 = socket(0xa, 0x3, 0x8) ioctl$SIOCX25SSUBSCRIP(r0, 0x89e1, &(0x7f0000000000)={'nr0\x00'}) [ 1044.132899][T16695] loop3: detected capacity change from 0 to 128 [ 1044.200374][T16695] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1044.219951][T16695] Mount JFS Failure: -5 [ 1044.225179][T16695] jfs_mount failed w/return code = -5 12:01:38 executing program 1: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) mmap$xdp(&(0x7f0000ffc000/0x3000)=nil, 0x7ffffffff000, 0x0, 0x10, r0, 0x0) [ 1044.246472][T16706] loop4: detected capacity change from 0 to 178 [ 1044.257550][T16706] jfs_mount: Mount Failure: superblock is corrupt! [ 1044.264909][T16706] Mount JFS Failure: -22 [ 1044.269384][T16706] jfs_mount failed w/return code = -22 [ 1044.279938][T16716] loop2: detected capacity change from 0 to 178 [ 1044.291168][T16716] Currently only 4K block size supported! 12:01:38 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x2000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x4d03000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x5000000, &(0x7f0000061000)) [ 1044.297471][T16716] Mount JFS Failure: -22 [ 1044.301896][T16716] jfs_mount failed w/return code = -22 12:01:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000040c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000031", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:38 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x3000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:38 executing program 1: socketpair$tipc(0x1e, 0x2, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r1, &(0x7f0000000200)=ANY=[], 0x208e24b) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x2, 0x28011, r1, 0x0) ioctl$TUNSETLINK(r0, 0x8912, 0x400308) r2 = socket(0x15, 0x5, 0x0) getsockopt(r2, 0x200000000114, 0x2720, &(0x7f0000000200)=""/102389, &(0x7f0000000000)=0x18ff5) [ 1044.516621][T16744] loop2: detected capacity change from 0 to 178 12:01:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x5001000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:38 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x7000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1044.566310][T16744] Currently only 4K block size supported! [ 1044.569713][T16747] loop4: detected capacity change from 0 to 178 [ 1044.581631][T16747] jfs_mount: Mount Failure: superblock is corrupt! [ 1044.588885][T16747] Mount JFS Failure: -22 [ 1044.593151][T16747] jfs_mount failed w/return code = -22 [ 1044.630906][T16743] loop3: detected capacity change from 0 to 128 [ 1044.649894][T16744] Mount JFS Failure: -22 [ 1044.709640][T16743] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1044.723479][T16744] jfs_mount failed w/return code = -22 12:01:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000036", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1044.760372][T16743] Mount JFS Failure: -5 12:01:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x5203000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1044.795322][T16743] jfs_mount failed w/return code = -5 12:01:38 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xe000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x6000000, &(0x7f0000061000)) 12:01:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000050c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:38 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x541b, 0x0) 12:01:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x5c00000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1044.952420][T16783] loop4: detected capacity change from 0 to 178 [ 1044.990258][T16783] jfs_mount: Mount Failure: superblock is corrupt! [ 1045.022461][T16783] Mount JFS Failure: -22 12:01:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x18020000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1045.065689][T16783] jfs_mount failed w/return code = -22 [ 1045.074359][T16798] loop3: detected capacity change from 0 to 128 [ 1045.082503][T16806] loop2: detected capacity change from 0 to 178 12:01:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x6a02000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x80) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x4e, 0x0, 0x7) [ 1045.131127][T16798] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1045.151884][T16806] Currently only 4K block size supported! [ 1045.157064][T16798] Mount JFS Failure: -5 [ 1045.172743][T16798] jfs_mount failed w/return code = -5 12:01:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x19030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000003c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1045.214074][T16806] Mount JFS Failure: -22 [ 1045.218537][T16806] jfs_mount failed w/return code = -22 12:01:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x7000000, &(0x7f0000061000)) 12:01:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x7b00000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:39 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x80) ioctl$sock_inet6_udp_SIOCINQ(r0, 0x541b, &(0x7f0000000000)) 12:01:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000060c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1045.401554][T16835] loop4: detected capacity change from 0 to 178 [ 1045.412356][T16835] jfs_mount: Mount Failure: superblock is corrupt! [ 1045.420182][T16835] Mount JFS Failure: -22 [ 1045.425436][T16835] jfs_mount failed w/return code = -22 12:01:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000003f", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x1a010000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1045.482389][T16844] loop3: detected capacity change from 0 to 128 [ 1045.505861][T16844] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1045.516105][T16844] Mount JFS Failure: -5 [ 1045.526903][T16844] jfs_mount failed w/return code = -5 12:01:39 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff}) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000001240)={'veth0_vlan\x00', &(0x7f0000001200)=@ethtool_rxfh_indir={0x2c}}) 12:01:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x8201000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x8000000, &(0x7f0000061000)) [ 1045.641071][T16864] loop2: detected capacity change from 0 to 178 [ 1045.651311][T16864] Currently only 4K block size supported! [ 1045.657436][T16864] Mount JFS Failure: -22 [ 1045.661771][T16864] jfs_mount failed w/return code = -22 12:01:39 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x0, @broadcast}, 0xf, 0x0, 0x0, &(0x7f0000000140)=[@ip_retopts={{0x14, 0x0, 0x7, {[@lsrr={0x83, 0x3}]}}}], 0x18}, 0x0) [ 1045.703247][T16866] loop4: detected capacity change from 0 to 178 12:01:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x1e030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1045.760939][T16866] jfs_mount: Mount Failure: superblock is corrupt! 12:01:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000070c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0x9102000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1045.816400][T16866] Mount JFS Failure: -22 [ 1045.830426][T16866] jfs_mount failed w/return code = -22 [ 1045.852112][T16889] loop3: detected capacity change from 0 to 128 [ 1045.937337][T16889] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:01:40 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x45000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:40 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$inet6_tcp_buf(r0, 0x6, 0x1f, 0x0, &(0x7f0000000000)) [ 1046.061378][T16889] Mount JFS Failure: -5 12:01:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000044", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1046.085995][T16889] jfs_mount failed w/return code = -5 [ 1046.097246][T16908] loop2: detected capacity change from 0 to 178 12:01:40 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x46000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1046.159925][T16908] Currently only 4K block size supported! 12:01:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xa302000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1046.219426][T16908] Mount JFS Failure: -22 12:01:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x9000000, &(0x7f0000061000)) [ 1046.262046][T16908] jfs_mount failed w/return code = -22 [ 1046.319261][T16924] loop4: detected capacity change from 0 to 178 [ 1046.350800][T16924] jfs_mount: Mount Failure: superblock is corrupt! [ 1046.360272][T16924] Mount JFS Failure: -22 12:01:40 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x4e20, @loopback}, 0x10, 0x0, 0x0, &(0x7f0000000080)=[@ip_retopts={{0x24, 0x0, 0x7, {[@generic={0x0, 0xd, "45d052077afb90d8b8f86d"}, @ra={0x94, 0x4}]}}}], 0x28}, 0x4000000) 12:01:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000080c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1046.366634][T16924] jfs_mount failed w/return code = -22 12:01:40 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x4d030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1046.441713][T16938] loop3: detected capacity change from 0 to 128 12:01:40 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x80) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0xb, 0x0, 0x7) [ 1046.520755][T16938] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:01:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000049", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xa502000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1046.564008][T16955] loop2: detected capacity change from 0 to 178 [ 1046.573235][T16938] Mount JFS Failure: -5 [ 1046.592832][T16938] jfs_mount failed w/return code = -5 12:01:40 executing program 1: r0 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000108f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000e4ff0800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000094100000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000004000000000000000000000000000000000000000000000feffffff"], 0x1) syz_emit_ethernet(0x4a, &(0x7f0000000ac0)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0xa, 0x10, 0x0, 0x0, 0x0, {[@sack={0x5, 0x12, [0x0, 0xc40801a0, 0x0, 0x0]}]}}}}}}}, 0x0) 12:01:40 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x50010000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1046.621746][T16955] Currently only 4K block size supported! [ 1046.630278][T16955] Mount JFS Failure: -22 [ 1046.645882][T16955] jfs_mount failed w/return code = -22 12:01:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xa000000, &(0x7f0000061000)) 12:01:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xb403000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000090c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1046.741730][T16976] loop4: detected capacity change from 0 to 178 [ 1046.762716][T16976] jfs_mount: Mount Failure: superblock is corrupt! [ 1046.782418][T16976] Mount JFS Failure: -22 [ 1046.813079][T16994] xt_CT: netfilter: NOTRACK target is deprecated, use CT instead or upgrade iptables [ 1046.817702][T16976] jfs_mount failed w/return code = -22 [ 1046.832136][T16991] loop2: detected capacity change from 0 to 178 [ 1046.843654][T16991] Currently only 4K block size supported! [ 1046.850067][T16991] Mount JFS Failure: -22 [ 1046.857619][T16991] jfs_mount failed w/return code = -22 12:01:40 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x52030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1046.863282][T16995] loop3: detected capacity change from 0 to 128 [ 1046.883376][T16995] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1046.910016][T16995] Mount JFS Failure: -5 12:01:41 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000051", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:41 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xbe01000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:41 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000a0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1046.985817][T16995] jfs_mount failed w/return code = -5 [ 1047.013233][T17009] loop4: detected capacity change from 0 to 178 [ 1047.113801][T17009] jfs_mount: Mount Failure: superblock is corrupt! [ 1047.121061][T17009] Mount JFS Failure: -22 12:01:41 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xc103000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:41 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xb000000, &(0x7f0000061000)) 12:01:41 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x5c000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1047.155791][T17009] jfs_mount failed w/return code = -22 [ 1047.244399][T17025] loop2: detected capacity change from 0 to 178 [ 1047.280727][T17025] Currently only 4K block size supported! [ 1047.337524][T17025] Mount JFS Failure: -22 [ 1047.402028][T17025] jfs_mount failed w/return code = -22 [ 1047.424056][T17039] loop3: detected capacity change from 0 to 128 [ 1047.442140][T17039] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1047.469202][T17039] Mount JFS Failure: -5 [ 1047.499148][T17039] jfs_mount failed w/return code = -5 12:01:44 executing program 1: r0 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000108f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000e4ff0800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000094100000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000004000000000000000000000000000000000000000000000feffffff"], 0x1) syz_emit_ethernet(0x4a, &(0x7f0000000ac0)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0xa, 0x10, 0x0, 0x0, 0x0, {[@sack={0x5, 0x12, [0x0, 0xc40801a0, 0x0, 0x0]}]}}}}}}}, 0x0) 12:01:44 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xd603000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000005d", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:44 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x6a020000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xc000000, &(0x7f0000061000)) [ 1050.332467][T17061] loop2: detected capacity change from 0 to 178 [ 1050.332533][T17067] loop4: detected capacity change from 0 to 178 [ 1050.348771][T17064] loop3: detected capacity change from 0 to 128 [ 1050.383229][T17061] Currently only 4K block size supported! [ 1050.389590][T17061] Mount JFS Failure: -22 [ 1050.395061][T17061] jfs_mount failed w/return code = -22 [ 1050.411523][T17067] jfs_mount: Mount Failure: superblock is corrupt! [ 1050.418368][T17067] Mount JFS Failure: -22 [ 1050.422612][T17067] jfs_mount failed w/return code = -22 12:01:44 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000d0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1050.432331][T17064] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:01:44 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xd902000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:44 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x7b000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1050.543612][T17064] Mount JFS Failure: -5 12:01:44 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000006f", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1050.569903][T17064] jfs_mount failed w/return code = -5 [ 1050.605650][T17091] loop2: detected capacity change from 0 to 178 [ 1050.625143][T17091] Currently only 4K block size supported! [ 1050.638034][T17091] Mount JFS Failure: -22 [ 1050.646864][T17091] jfs_mount failed w/return code = -22 [ 1050.759562][T17103] loop4: detected capacity change from 0 to 178 [ 1050.776901][T17103] jfs_mount: Mount Failure: superblock is corrupt! [ 1050.791707][T17103] Mount JFS Failure: -22 [ 1050.804203][T17103] jfs_mount failed w/return code = -22 12:01:44 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xd000000, &(0x7f0000061000)) 12:01:44 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xdd03000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1051.041257][T17124] loop3: detected capacity change from 0 to 128 [ 1051.094035][T17124] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1051.139484][T17124] Mount JFS Failure: -5 [ 1051.151211][T17124] jfs_mount failed w/return code = -5 12:01:45 executing program 1: r0 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000108f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000e4ff0800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000094100000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000004000000000000000000000000000000000000000000000feffffff"], 0x1) syz_emit_ethernet(0x4a, &(0x7f0000000ac0)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0xa, 0x10, 0x0, 0x0, 0x0, {[@sack={0x5, 0x12, [0x0, 0xc40801a0, 0x0, 0x0]}]}}}}}}}, 0x0) 12:01:45 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000f0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:45 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x82010000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:45 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000ff", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:45 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xe100000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:45 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xf000000, &(0x7f0000061000)) [ 1052.011672][T17146] loop3: detected capacity change from 0 to 128 [ 1052.022698][T17146] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1052.029164][T17139] loop2: detected capacity change from 0 to 178 [ 1052.030160][T17146] Mount JFS Failure: -5 [ 1052.037224][T17141] loop4: detected capacity change from 0 to 178 [ 1052.040800][T17146] jfs_mount failed w/return code = -5 12:01:46 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x91020000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1052.068819][T17139] Currently only 4K block size supported! 12:01:46 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xf000000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1052.109969][T17139] Mount JFS Failure: -22 12:01:46 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x10000000, &(0x7f0000061000)) [ 1052.147900][T17141] jfs_mount: Mount Failure: superblock is corrupt! [ 1052.177151][T17139] jfs_mount failed w/return code = -22 12:01:46 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xa3020000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1052.214306][T17141] Mount JFS Failure: -22 [ 1052.231423][T17141] jfs_mount failed w/return code = -22 12:01:46 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xf402000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:46 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000100c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1052.369689][T17177] loop3: detected capacity change from 0 to 128 [ 1052.485342][T17177] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1052.550625][T17177] Mount JFS Failure: -5 [ 1052.583551][T17177] jfs_mount failed w/return code = -5 [ 1052.623502][T17193] loop2: detected capacity change from 0 to 178 [ 1052.683119][T17193] Currently only 4K block size supported! [ 1052.701845][T17193] Mount JFS Failure: -22 [ 1052.708046][T17193] jfs_mount failed w/return code = -22 [ 1053.754537][ T3247] ieee802154 phy0 wpan0: encryption failed: -22 [ 1053.760980][ T3247] ieee802154 phy1 wpan1: encryption failed: -22 12:01:48 executing program 1: r0 = socket$inet(0x2, 0x4000000000080001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000200)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000108f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000e4ff0800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000094100000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000004000000000000000000000000000000000000000000000feffffff"], 0x1) syz_emit_ethernet(0x4a, &(0x7f0000000ac0)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x3c, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0xa, 0x10, 0x0, 0x0, 0x0, {[@sack={0x5, 0x12, [0x0, 0xc40801a0, 0x0, 0x0]}]}}}}}}}, 0x0) 12:01:48 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xa5020000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000007", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:48 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xfa03000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x11000000, &(0x7f0000061000)) 12:01:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000110c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1054.148344][T17210] loop4: detected capacity change from 0 to 178 [ 1054.149574][T17211] loop2: detected capacity change from 0 to 178 [ 1054.165131][T17212] loop3: detected capacity change from 0 to 128 [ 1054.219705][T17211] Currently only 4K block size supported! [ 1054.229515][T17210] jfs_mount: Mount Failure: superblock is corrupt! [ 1054.237294][T17212] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:01:48 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xb4030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1054.284024][T17211] Mount JFS Failure: -22 [ 1054.289457][T17211] jfs_mount failed w/return code = -22 [ 1054.315687][T17212] Mount JFS Failure: -5 [ 1054.325576][T17210] Mount JFS Failure: -22 12:01:48 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00', {0xffffffff00000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1054.363979][T17212] jfs_mount failed w/return code = -5 [ 1054.381386][T17210] jfs_mount failed w/return code = -22 12:01:48 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000230c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:48 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x1f000000, &(0x7f0000061000)) 12:01:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000b", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:48 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xbe010000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1054.615151][T17247] loop2: detected capacity change from 0 to 178 [ 1054.715891][T17247] Currently only 4K block size supported! [ 1054.739989][T17261] loop4: detected capacity change from 0 to 178 [ 1054.753511][T17256] loop3: detected capacity change from 0 to 128 [ 1054.779234][T17256] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1054.785960][T17247] Mount JFS Failure: -22 [ 1054.797827][T17256] Mount JFS Failure: -5 [ 1054.804987][T17261] jfs_mount: Mount Failure: superblock is corrupt! [ 1054.812624][T17256] jfs_mount failed w/return code = -5 [ 1054.842524][T17247] jfs_mount failed w/return code = -22 [ 1054.859733][T17261] Mount JFS Failure: -22 [ 1054.891302][T17261] jfs_mount failed w/return code = -22 12:01:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x20000000, &(0x7f0000061000)) 12:01:51 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:51 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xc1030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000360c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000010", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:51 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) sendmsg(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x240640d0) [ 1057.176049][T17285] loop4: detected capacity change from 0 to 178 [ 1057.190230][T17284] loop2: detected capacity change from 0 to 178 12:01:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x9, 0x0, &(0x7f00000001c0)) [ 1057.227154][T17294] loop3: detected capacity change from 0 to 128 [ 1057.242083][T17284] Currently only 4K block size supported! [ 1057.247717][T17285] jfs_mount: Mount Failure: superblock is corrupt! [ 1057.255211][T17284] Mount JFS Failure: -22 [ 1057.259461][T17284] jfs_mount failed w/return code = -22 12:01:51 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xd6030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:51 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x2, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000370c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1057.357197][T17285] Mount JFS Failure: -22 [ 1057.370219][T17285] jfs_mount failed w/return code = -22 [ 1057.413649][T17294] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1057.456832][T17294] Mount JFS Failure: -5 12:01:51 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x3, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:51 executing program 1: r0 = socket$inet6(0xa, 0x3, 0x80) setsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x1d, 0x0, 0x7) [ 1057.491559][T17309] loop2: detected capacity change from 0 to 178 [ 1057.493080][T17294] jfs_mount failed w/return code = -5 [ 1057.533121][T17309] Currently only 4K block size supported! [ 1057.540192][T17309] Mount JFS Failure: -22 [ 1057.546668][T17309] jfs_mount failed w/return code = -22 12:01:51 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x20100000, &(0x7f0000061000)) 12:01:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000014", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:51 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000380c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:51 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xd9020000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:51 executing program 1: pipe(&(0x7f00000026c0)={0xffffffffffffffff, 0xffffffffffffffff}) write$cgroup_subtree(r0, &(0x7f0000000000), 0x0) 12:01:51 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x4, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:51 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000017", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1057.856449][T17348] loop4: detected capacity change from 0 to 178 [ 1057.876703][T17348] jfs_mount: Mount Failure: superblock is corrupt! [ 1057.885217][T17348] Mount JFS Failure: -22 [ 1057.889759][T17348] jfs_mount failed w/return code = -22 [ 1057.897758][T17350] loop2: detected capacity change from 0 to 178 12:01:51 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x7, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:52 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xdd030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1057.949625][T17350] Currently only 4K block size supported! [ 1057.975303][T17349] loop3: detected capacity change from 0 to 128 [ 1058.017823][T17350] Mount JFS Failure: -22 [ 1058.050332][T17366] loop4: detected capacity change from 0 to 178 [ 1058.062521][T17350] jfs_mount failed w/return code = -22 12:01:52 executing program 1: pipe2$9p(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RWALK(r0, 0x0, 0x41e2a6b031f34087) 12:01:52 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xe, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x23000000, &(0x7f0000061000)) [ 1058.106919][T17366] jfs_mount: Mount Failure: superblock is corrupt! [ 1058.143920][T17366] Mount JFS Failure: -22 12:01:52 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xe1000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1058.160821][T17366] jfs_mount failed w/return code = -22 12:01:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000031", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000480c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1058.311250][T17393] loop3: detected capacity change from 0 to 128 12:01:52 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0xffffffffffffff83) 12:01:52 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xf0000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1058.402300][T17393] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1058.448723][T17408] loop4: detected capacity change from 0 to 178 [ 1058.466525][T17408] jfs_mount: Mount Failure: superblock is corrupt! [ 1058.466617][T17393] Mount JFS Failure: -5 [ 1058.481709][T17414] loop2: detected capacity change from 0 to 178 [ 1058.486203][T17408] Mount JFS Failure: -22 [ 1058.492259][T17408] jfs_mount failed w/return code = -22 12:01:52 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x45, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1058.514071][T17393] jfs_mount failed w/return code = -5 [ 1058.581206][T17414] Currently only 4K block size supported! [ 1058.655850][T17414] Mount JFS Failure: -22 12:01:52 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000036", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:52 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x3f000000, &(0x7f0000061000)) 12:01:52 executing program 1: munmap(&(0x7f0000ffa000/0x3000)=nil, 0x3000) mprotect(&(0x7f0000ffb000/0x1000)=nil, 0x1000, 0x0) 12:01:52 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xf4020000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1058.700401][T17414] jfs_mount failed w/return code = -22 12:01:52 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x46, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:52 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010004c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1058.853299][T17448] loop4: detected capacity change from 0 to 178 [ 1058.870698][T17445] loop3: detected capacity change from 0 to 128 12:01:52 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xfa030000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1058.895466][T17448] jfs_mount: Mount Failure: superblock is corrupt! [ 1058.928995][T17445] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:01:53 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, 0x0, 0x55) [ 1058.990621][T17448] Mount JFS Failure: -22 12:01:53 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x5c, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1059.014895][T17445] Mount JFS Failure: -5 [ 1059.021778][T17465] loop2: detected capacity change from 0 to 178 [ 1059.027429][T17448] jfs_mount failed w/return code = -22 [ 1059.046472][T17445] jfs_mount failed w/return code = -5 [ 1059.060536][T17465] Currently only 4K block size supported! [ 1059.080580][T17465] Mount JFS Failure: -22 [ 1059.087935][T17465] jfs_mount failed w/return code = -22 12:01:53 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x2000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:53 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$inet(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10, 0x0, 0x0, &(0x7f0000000140)=[@ip_retopts={{0x14, 0x0, 0x1600bd75, {[@lsrr={0x83, 0x3}]}}}], 0x18}, 0x0) 12:01:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x40000000, &(0x7f0000061000)) 12:01:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000003c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000600c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:53 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x7b, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_FS_INFO(0xffffffffffffffff, 0x8400941f, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:01:53 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x4000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1059.360517][T17502] loop3: detected capacity change from 0 to 128 [ 1059.371039][T17503] loop4: detected capacity change from 0 to 178 [ 1059.389620][T17506] loop2: detected capacity change from 0 to 178 [ 1059.402163][T17506] Currently only 4K block size supported! [ 1059.413730][T17506] Mount JFS Failure: -22 [ 1059.420182][T17506] jfs_mount failed w/return code = -22 [ 1059.435722][T17502] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:01:53 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xe1, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1059.460897][T17503] jfs_mount: Mount Failure: superblock is corrupt! [ 1059.479058][T17502] Mount JFS Failure: -5 [ 1059.484950][T17502] jfs_mount failed w/return code = -5 [ 1059.509478][T17503] Mount JFS Failure: -22 12:01:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000680c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1059.534648][T17503] jfs_mount failed w/return code = -22 12:01:53 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x100000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:53 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x48000000, &(0x7f0000061000)) 12:01:53 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xf0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:53 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_FS_INFO(0xffffffffffffffff, 0x8400941f, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:01:53 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000044", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1059.745395][T17546] loop2: detected capacity change from 0 to 178 [ 1059.810342][T17546] Currently only 4K block size supported! [ 1059.817250][T17546] Mount JFS Failure: -22 [ 1059.822696][T17546] jfs_mount failed w/return code = -22 12:01:53 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x200000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1059.855057][T17562] loop3: detected capacity change from 0 to 128 [ 1059.856404][T17564] loop4: detected capacity change from 0 to 178 12:01:53 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010006c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1059.902465][T17564] jfs_mount: Mount Failure: superblock is corrupt! [ 1059.913634][T17562] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1059.938249][T17564] Mount JFS Failure: -22 12:01:54 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x11a, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1059.959152][T17564] jfs_mount failed w/return code = -22 [ 1059.974050][T17562] Mount JFS Failure: -5 12:01:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_FS_INFO(0xffffffffffffffff, 0x8400941f, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) [ 1060.002098][T17562] jfs_mount failed w/return code = -5 12:01:54 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x300000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1060.067732][T17581] loop2: detected capacity change from 0 to 178 12:01:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000049", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:54 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000300)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc-serpent-sse2\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, 0x0, 0x0) ioctl$BTRFS_IOC_FS_INFO(0xffffffffffffffff, 0x8400941f, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$incfs(0xffffffffffffffff, 0x0, 0x0, 0x0) 12:01:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x4c000000, &(0x7f0000061000)) 12:01:54 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x150, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1060.153169][T17581] Currently only 4K block size supported! [ 1060.186832][T17581] Mount JFS Failure: -22 [ 1060.192095][T17581] jfs_mount failed w/return code = -22 12:01:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000740c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:54 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000080), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f00000005c0)={0x8, 0x0, &(0x7f0000000400)=[@enter_looper, @register_looper], 0x0, 0x0, 0x0}) 12:01:54 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x700000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1060.326475][T17615] loop4: detected capacity change from 0 to 178 [ 1060.333182][T17605] loop3: detected capacity change from 0 to 128 12:01:54 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x182, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1060.373518][T17615] jfs_mount: Mount Failure: superblock is corrupt! [ 1060.380559][T17615] Mount JFS Failure: -22 [ 1060.391334][T17615] jfs_mount failed w/return code = -22 [ 1060.403211][T17605] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1060.423903][T17605] Mount JFS Failure: -5 [ 1060.428090][T17605] jfs_mount failed w/return code = -5 12:01:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000051", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:54 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x60000000, &(0x7f0000061000)) 12:01:54 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xe00000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1060.494345][T17637] loop2: detected capacity change from 0 to 178 [ 1060.523399][T17637] Currently only 4K block size supported! 12:01:54 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1be, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1060.579609][T17637] Mount JFS Failure: -22 [ 1060.585582][T17637] jfs_mount failed w/return code = -22 [ 1060.604392][T17654] loop4: detected capacity change from 0 to 178 [ 1060.615635][T17654] jfs_mount: Mount Failure: superblock is corrupt! [ 1060.622448][T17654] Mount JFS Failure: -22 12:01:54 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000300)={&(0x7f00000000c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xd, 0xd, 0x2, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "1e"}]}}, &(0x7f0000000200)=""/206, 0x2a, 0xce, 0x1}, 0x20) [ 1060.628551][T17654] jfs_mount failed w/return code = -22 12:01:54 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x1802000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:54 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010007a0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:54 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000005d", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:54 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x1903000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1060.725088][T17667] loop3: detected capacity change from 0 to 128 [ 1060.739569][T17667] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1060.747668][T17667] Mount JFS Failure: -5 [ 1060.753523][T17667] jfs_mount failed w/return code = -5 12:01:54 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x218, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:55 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x49, 0x0, 0x0) 12:01:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x60d7147a, &(0x7f0000061000)) [ 1060.966431][T17691] loop4: detected capacity change from 0 to 178 [ 1060.999896][T17694] loop2: detected capacity change from 0 to 178 12:01:55 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x1a01000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1061.019198][T17694] Currently only 4K block size supported! [ 1061.026372][T17694] Mount JFS Failure: -22 [ 1061.031101][T17691] jfs_mount: Mount Failure: superblock is corrupt! [ 1061.031172][T17694] jfs_mount failed w/return code = -22 12:01:55 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x26a, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1061.067693][T17691] Mount JFS Failure: -22 [ 1061.100658][T17691] jfs_mount failed w/return code = -22 12:01:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000014", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1061.147704][T17711] loop3: detected capacity change from 0 to 128 12:01:55 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f0000000040)={0xa, 0x4, 0xfa00, {r1}}, 0xc) 12:01:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x68000000, &(0x7f0000061000)) 12:01:55 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x1e03000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000006f", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:55 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x291, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1061.326194][T17737] loop2: detected capacity change from 0 to 178 [ 1061.385085][T17737] jfs_mount: Mount Failure: superblock is corrupt! [ 1061.400950][T17737] Mount JFS Failure: -22 [ 1061.408747][T17737] jfs_mount failed w/return code = -22 [ 1061.417934][T17752] loop3: detected capacity change from 0 to 128 [ 1061.427408][T17753] loop4: detected capacity change from 0 to 178 [ 1061.450723][T17752] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1061.460206][T17752] Mount JFS Failure: -5 [ 1061.469885][T17752] jfs_mount failed w/return code = -5 12:01:55 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000017", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:55 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x2a3, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1061.494311][T17753] jfs_mount: Mount Failure: superblock is corrupt! [ 1061.502003][T17753] Mount JFS Failure: -22 [ 1061.513467][T17753] jfs_mount failed w/return code = -22 12:01:55 executing program 1: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RNDADDENTROPY(r0, 0x40085203, &(0x7f0000000040)={0x3}) 12:01:55 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x4500000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:55 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x28, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:55 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x6c000000, &(0x7f0000061000)) 12:01:55 executing program 1: r0 = syz_open_dev$binderN(&(0x7f0000000040), 0x0, 0x0) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000300)={0x4c, 0x0, &(0x7f0000000140)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}], 0x1000000, 0x0, 0x0}) 12:01:55 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x4600000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1061.715265][T17777] loop2: detected capacity change from 0 to 178 [ 1061.790222][T17777] jfs_mount: Mount Failure: superblock is corrupt! [ 1061.813483][T17794] binder: 17789:17794 ioctl c0306201 20000300 returned -14 [ 1061.826426][T17792] loop4: detected capacity change from 0 to 178 [ 1061.840335][T17788] loop3: detected capacity change from 0 to 128 [ 1061.856638][T17792] jfs_mount: Mount Failure: superblock is corrupt! [ 1061.879686][T17788] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1061.880259][T17777] Mount JFS Failure: -22 12:01:55 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x2a5, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:55 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$pppoe(0x18, 0x1, 0x0) connect$pppoe(r0, &(0x7f0000000040)={0x18, 0x0, {0x4, @broadcast, 'vxcan1\x00'}}, 0x1e) sendmmsg(r0, &(0x7f000000d180), 0x4000000000000eb, 0x0) [ 1061.887323][T17788] Mount JFS Failure: -5 [ 1061.895524][T17788] jfs_mount failed w/return code = -5 [ 1061.901912][T17792] Mount JFS Failure: -22 [ 1061.907560][T17792] jfs_mount failed w/return code = -22 [ 1061.914036][T17777] jfs_mount failed w/return code = -22 12:01:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x74000000, &(0x7f0000061000)) 12:01:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x31, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000001f", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:56 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x4d03000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:56 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x2d9, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1062.136389][T17820] loop4: detected capacity change from 0 to 178 [ 1062.168381][T17823] loop3: detected capacity change from 0 to 128 12:01:56 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x5001000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1062.195790][T17820] jfs_mount: Mount Failure: File System Dirty. [ 1062.223298][T17820] Mount JFS Failure: -22 [ 1062.228850][T17832] loop2: detected capacity change from 0 to 178 [ 1062.229148][T17820] jfs_mount failed w/return code = -22 [ 1062.254545][T17823] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:01:56 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x2f4, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1062.316270][T17823] Mount JFS Failure: -5 [ 1062.326444][T17832] jfs_mount: Mount Failure: superblock is corrupt! [ 1062.338661][T17823] jfs_mount failed w/return code = -5 12:01:56 executing program 1: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000480), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x40345410, &(0x7f00000004c0)={{0xffffffffffffffff}}) 12:01:56 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x5203000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1062.378036][T17832] Mount JFS Failure: -22 12:01:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x36, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x7a000000, &(0x7f0000061000)) [ 1062.424827][T17832] jfs_mount failed w/return code = -22 12:01:56 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x300, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:56 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000031", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1062.603195][T17869] loop3: detected capacity change from 0 to 128 12:01:56 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x18, 0x1, 0x9, 0x401, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x4}]}, 0x18}}, 0x0) 12:01:56 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x5c00000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1062.644526][T17869] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1062.669816][T17869] Mount JFS Failure: -5 [ 1062.675068][T17869] jfs_mount failed w/return code = -5 [ 1062.694358][T17876] loop4: detected capacity change from 0 to 178 [ 1062.706147][T17876] jfs_mount: Mount Failure: File System Dirty. [ 1062.713406][T17876] Mount JFS Failure: -22 [ 1062.721146][T17876] jfs_mount failed w/return code = -22 [ 1062.729210][T17884] loop2: detected capacity change from 0 to 178 [ 1062.780749][T17884] jfs_mount: Mount Failure: superblock is corrupt! 12:01:56 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x319, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:56 executing program 1: syz_open_dev$usbmon(&(0x7f0000000840), 0x4, 0x0) 12:01:56 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x7a14d760, &(0x7f0000061000)) 12:01:56 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x6a02000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:56 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x3c, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1062.831603][T17884] Mount JFS Failure: -22 [ 1062.846842][T17884] jfs_mount failed w/return code = -22 [ 1062.965549][T17909] loop3: detected capacity change from 0 to 128 12:01:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000036", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:57 executing program 1: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFNL_MSG_CTHELPER_GET(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000340)={0x38, 0x1, 0x9, 0x401, 0x0, 0x0, {}, [@NFCTH_TUPLE={0x24, 0x2, [@CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}, @CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x8, 0x2, @remote}}}]}]}, 0x38}}, 0x0) 12:01:57 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x31e, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1063.080471][T17920] loop4: detected capacity change from 0 to 178 [ 1063.092877][T17920] jfs_mount: Mount Failure: File System Dirty. [ 1063.100510][T17920] Mount JFS Failure: -22 [ 1063.105914][T17920] jfs_mount failed w/return code = -22 12:01:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x8cffffff, &(0x7f0000061000)) 12:01:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x44, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:57 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x7b00000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1063.147462][T17929] loop2: detected capacity change from 0 to 178 12:01:57 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000040)={0x10, 0x2}, 0x65) 12:01:57 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x34d, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1063.238599][T17940] netlink: 'syz-executor.1': attribute type 2 has an invalid length. [ 1063.251071][T17940] netlink: 'syz-executor.1': attribute type 1 has an invalid length. [ 1063.252156][T17929] jfs_mount: Mount Failure: superblock is corrupt! [ 1063.314983][T17929] Mount JFS Failure: -22 [ 1063.320750][T17929] jfs_mount failed w/return code = -22 12:01:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000003c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1063.357050][T17949] loop4: detected capacity change from 0 to 178 [ 1063.397361][T17953] loop3: detected capacity change from 0 to 128 [ 1063.419362][T17949] jfs_mount: Mount Failure: File System Dirty. 12:01:57 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x8201000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1063.442784][T17963] loop2: detected capacity change from 0 to 178 12:01:57 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x352, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1063.475163][T17949] Mount JFS Failure: -22 [ 1063.479820][T17949] jfs_mount failed w/return code = -22 [ 1063.490822][T17963] jfs_mount: Mount Failure: superblock is corrupt! 12:01:57 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0x9102000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:57 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) r3 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r3, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r4 = dup(r3) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r4, 0x84, 0x105, &(0x7f0000000100)=ANY=[], &(0x7f0000000040)=0x8) r5 = socket$inet6_sctp(0x1c, 0x5, 0x84) r6 = dup(r5) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r6, 0x84, 0x105, &(0x7f0000000100)={0x1, [0x0]}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x26, &(0x7f00000018c0)={r7}, &(0x7f0000001900)=0x8) [ 1063.526667][T17963] Mount JFS Failure: -22 12:01:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xa3160000, &(0x7f0000061000)) [ 1063.569237][T17963] jfs_mount failed w/return code = -22 12:01:57 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x49, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:57 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xa302000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000003f", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1063.727186][T17995] loop3: detected capacity change from 0 to 128 12:01:57 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x3b4, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:57 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xab160000, &(0x7f0000061000)) [ 1063.872650][T18010] loop4: detected capacity change from 0 to 178 [ 1063.906159][T18010] jfs_mount: Mount Failure: File System Dirty. [ 1063.913542][T18010] Mount JFS Failure: -22 [ 1063.918014][T18010] jfs_mount failed w/return code = -22 12:01:58 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x3c1, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1064.008295][T18031] loop2: detected capacity change from 0 to 178 12:01:58 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xa502000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:58 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0xffffffffffffffa4, 0x0, &(0x7f0000000000)={0x1c, 0x1c}, 0x1c) 12:01:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x51, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1064.098186][T18031] jfs_mount: Mount Failure: superblock is corrupt! [ 1064.128836][T18032] loop3: detected capacity change from 0 to 128 [ 1064.169298][T18031] Mount JFS Failure: -22 [ 1064.173662][T18031] jfs_mount failed w/return code = -22 [ 1064.227145][T18057] loop4: detected capacity change from 0 to 178 [ 1064.240892][T18057] jfs_mount: Mount Failure: File System Dirty. 12:01:58 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xb403000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xad160000, &(0x7f0000061000)) 12:01:58 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x3d6, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1064.309594][T18057] Mount JFS Failure: -22 [ 1064.315076][T18057] jfs_mount failed w/return code = -22 12:01:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000049", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:58 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r0, r1) sendmsg$inet_sctp(r2, &(0x7f0000000900)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) 12:01:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x5d, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:58 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x3dd, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1064.486269][T18077] loop3: detected capacity change from 0 to 128 [ 1064.551067][T18090] loop4: detected capacity change from 0 to 178 [ 1064.552088][T18083] loop2: detected capacity change from 0 to 178 12:01:58 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xbe01000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:58 executing program 1: r0 = socket(0x2, 0x5, 0x0) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000140)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000001400)=[@dstaddrv6={0x1c, 0x84, 0xa, @ipv4={'\x00', '\xff\xff', @remote={0xac, 0x14, 0x0}}}, @prinfo={0x14}], 0x30}, 0x0) 12:01:58 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xc0ed0000, &(0x7f0000061000)) [ 1064.610224][T18090] jfs_mount: Mount Failure: File System Dirty. [ 1064.646931][T18083] jfs_mount: Mount Failure: superblock is corrupt! [ 1064.655402][T18090] Mount JFS Failure: -22 12:01:58 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x3fa, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1064.670261][T18090] jfs_mount failed w/return code = -22 [ 1064.680539][T18083] Mount JFS Failure: -22 [ 1064.691619][T18083] jfs_mount failed w/return code = -22 12:01:58 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xc103000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:58 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000051", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:58 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x6f, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:58 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x700, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:58 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xd603000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1064.882832][T18131] loop3: detected capacity change from 0 to 128 [ 1064.918389][T18131] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:01:58 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) r2 = dup2(r1, r0) sendmsg$inet_sctp(r2, &(0x7f0000000740)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x1}, 0x1c, 0x0, 0x0, &(0x7f00000006c0)=[@dstaddrv4={0x10, 0x84, 0x9, @loopback}, @sndinfo={0x1c}, @sndrcv={0x2c}], 0x58}, 0x0) [ 1064.933105][T18131] Mount JFS Failure: -5 [ 1064.938011][T18131] jfs_mount failed w/return code = -5 [ 1064.948989][T18135] loop2: detected capacity change from 0 to 178 [ 1064.959467][T18135] jfs_mount: Mount Failure: superblock is corrupt! [ 1064.968633][T18135] Mount JFS Failure: -22 [ 1064.972983][T18135] jfs_mount failed w/return code = -22 [ 1064.976864][T18141] loop4: detected capacity change from 0 to 178 12:01:59 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xd902000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xf5ffffff, &(0x7f0000061000)) [ 1065.026902][T18141] jfs_mount: Mount Failure: File System Dirty. [ 1065.034899][T18141] Mount JFS Failure: -22 [ 1065.039555][T18141] jfs_mount failed w/return code = -22 12:01:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000005d", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x7f00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:59 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xe00, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:59 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xdd03000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:59 executing program 1: r0 = socket(0x2, 0x1, 0x0) sendto(r0, &(0x7f00000005c0)="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", 0x5a3, 0x0, &(0x7f0000000480)=@in={0x10, 0x2}, 0x10) [ 1065.224898][T18172] loop3: detected capacity change from 0 to 128 [ 1065.295187][T18185] loop4: detected capacity change from 0 to 178 [ 1065.310549][T18185] Mount JFS Failure: -22 [ 1065.321069][T18185] jfs_mount failed w/return code = -22 [ 1065.332817][T18191] loop2: detected capacity change from 0 to 178 [ 1065.348960][T18191] jfs_mount: Mount Failure: superblock is corrupt! [ 1065.361376][T18191] Mount JFS Failure: -22 [ 1065.367060][T18191] jfs_mount failed w/return code = -22 12:01:59 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000014c0)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, &(0x7f0000001340)=[{&(0x7f0000000080)="f3", 0x1}], 0x1, &(0x7f0000001400)=[@init={0x14, 0x84, 0x1, {0x0, 0x0, 0x0, 0x2}}], 0x14}, 0x0) 12:01:59 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xe100000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:59 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1802, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000006f", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xf6ffffff, &(0x7f0000061000)) 12:01:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8002}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:59 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000000000)={0x1c, 0x1c, 0x3}, 0x1c) getsockname$inet6(r0, 0x0, &(0x7f0000000080)) [ 1065.600839][T18216] loop2: detected capacity change from 0 to 178 [ 1065.644667][T18219] loop3: detected capacity change from 0 to 128 [ 1065.670586][T18226] loop4: detected capacity change from 0 to 178 [ 1065.680617][T18216] jfs_mount: Mount Failure: superblock is corrupt! 12:01:59 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xf000000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:59 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1903, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1065.711579][T18216] Mount JFS Failure: -22 [ 1065.717688][T18216] jfs_mount failed w/return code = -22 [ 1065.725555][T18226] Mount JFS Failure: -22 [ 1065.761196][T18226] jfs_mount failed w/return code = -22 12:01:59 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xf9fdffff, &(0x7f0000061000)) 12:01:59 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000ff", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:59 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xf402000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:01:59 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000040)="b0cbf21a2cbc5fd96b0df510da4780cf5c7b98b99ecc44b97d03832a4a745f1278c295238781df58e365e1c1859984aeb3d05b70081ea98520f0bab16db55028befe9878df558a0d1a1e909cf80cd6f5", 0x50, 0xf0c4e9d1a3644736, &(0x7f00000000c0)={0x1c, 0x1c, 0x2}, 0xd3) 12:01:59 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8003}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:01:59 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1a01, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1065.958509][T18260] loop3: detected capacity change from 0 to 128 12:02:00 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xfa03000000000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfbffffff, &(0x7f0000061000)) [ 1066.045827][T18280] loop2: detected capacity change from 0 to 178 12:02:00 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) setsockopt$inet_sctp_SCTP_EVENTS(r1, 0x84, 0xc, &(0x7f0000000000), 0x4) [ 1066.110043][T18280] jfs_mount: Mount Failure: superblock is corrupt! [ 1066.127638][T18291] loop4: detected capacity change from 0 to 178 12:02:00 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1e03, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1066.155149][T18291] Mount JFS Failure: -22 [ 1066.161238][T18280] Mount JFS Failure: -22 [ 1066.190372][T18291] jfs_mount failed w/return code = -22 [ 1066.196776][T18280] jfs_mount failed w/return code = -22 [ 1066.205703][T18297] loop3: detected capacity change from 0 to 128 12:02:00 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00', {0xffffffff00000000}}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfcfdffff, &(0x7f0000061000)) 12:02:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8004}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000007", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:00 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x4500, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:00 executing program 1: socket$inet_udplite(0x2, 0x2, 0x88) accept$inet6(0xffffffffffffffff, 0x0, &(0x7f00000000c0)) socket$inet_tcp(0x2, 0x1, 0x0) fork() [ 1066.488087][T18336] loop2: detected capacity change from 0 to 178 [ 1066.488512][T18335] loop3: detected capacity change from 0 to 128 [ 1066.497990][T18337] loop4: detected capacity change from 0 to 178 [ 1066.511813][T18337] Mount JFS Failure: -22 [ 1066.517798][T18337] jfs_mount failed w/return code = -22 [ 1066.531346][T18336] jfs_mount: Mount Failure: superblock is corrupt! 12:02:00 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1066.539304][T18336] Mount JFS Failure: -22 [ 1066.544513][T18336] jfs_mount failed w/return code = -22 12:02:00 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x4600, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:00 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8005}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:00 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000b", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfdfdffff, &(0x7f0000061000)) 12:02:00 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x2, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:00 executing program 1: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) getsockopt$sock_int(r0, 0xffff, 0x20, 0x0, &(0x7f0000000380)) 12:02:00 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x4d03, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1066.852366][T18380] loop4: detected capacity change from 0 to 178 [ 1066.861965][T18380] Mount JFS Failure: -22 [ 1066.870056][T18382] loop3: detected capacity change from 0 to 128 [ 1066.871227][T18381] loop2: detected capacity change from 0 to 178 [ 1066.892308][T18380] jfs_mount failed w/return code = -22 12:02:00 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x3, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1066.898764][T18381] jfs_mount: Mount Failure: superblock is corrupt! [ 1066.909228][T18381] Mount JFS Failure: -22 [ 1066.918301][T18381] jfs_mount failed w/return code = -22 12:02:01 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x4, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8006}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000010", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x5001, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfeffffff, &(0x7f0000061000)) 12:02:01 executing program 1: mprotect(&(0x7f0000ff8000/0x7000)=nil, 0x7000, 0x6) 12:02:01 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x7, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1067.191881][T18429] loop2: detected capacity change from 0 to 178 [ 1067.215909][T18429] jfs_mount: Mount Failure: superblock is corrupt! [ 1067.230770][T18429] Mount JFS Failure: -22 [ 1067.235765][T18436] loop3: detected capacity change from 0 to 128 [ 1067.242616][T18429] jfs_mount failed w/return code = -22 12:02:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x5203, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1067.286119][T18440] loop4: detected capacity change from 0 to 178 12:02:01 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) bind$inet(r0, &(0x7f0000000300)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r1, &(0x7f0000000480)={0x0, 0x0, 0x0}, 0x0) 12:02:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000014", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1067.361237][T18440] Mount JFS Failure: -22 [ 1067.366656][T18440] jfs_mount failed w/return code = -22 12:02:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xff000000, &(0x7f0000061000)) 12:02:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8007}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x5c00, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:01 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xe, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x6a02, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:01 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0x19, &(0x7f0000000080), &(0x7f0000000100)=0x8) [ 1067.572408][T18475] loop3: detected capacity change from 0 to 128 [ 1067.585473][T18476] loop2: detected capacity change from 0 to 178 [ 1067.602085][T18478] loop4: detected capacity change from 0 to 178 12:02:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xff0f0000, &(0x7f0000061000)) [ 1067.657062][T18476] jfs_mount: Mount Failure: superblock is corrupt! [ 1067.680261][T18478] Mount JFS Failure: -22 [ 1067.692833][T18476] Mount JFS Failure: -22 [ 1067.698016][T18478] jfs_mount failed w/return code = -22 12:02:01 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x45, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:01 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x7b00, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1067.707707][T18476] jfs_mount failed w/return code = -22 [ 1067.771294][T18503] loop3: detected capacity change from 0 to 128 12:02:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8008}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:01 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000017", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:01 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xffefffff, &(0x7f0000061000)) 12:02:01 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x46, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) listen(r0, 0x0) 12:02:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x8201, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1068.008309][T18534] loop2: detected capacity change from 0 to 178 [ 1068.050155][T18537] loop4: detected capacity change from 0 to 178 [ 1068.067464][T18534] jfs_mount: Mount Failure: superblock is corrupt! 12:02:02 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) bind$inet6(r1, &(0x7f0000000000)={0x1c, 0x1c, 0x2}, 0x1c) connect$inet(r1, &(0x7f0000000040)={0x10, 0x2}, 0x10) 12:02:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x5c, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1068.092452][T18537] Mount JFS Failure: -22 [ 1068.100780][T18534] Mount JFS Failure: -22 [ 1068.105740][T18534] jfs_mount failed w/return code = -22 [ 1068.111762][T18550] loop3: detected capacity change from 0 to 128 [ 1068.128630][T18537] jfs_mount failed w/return code = -22 12:02:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x9102, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000031", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8009}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xffff8000, &(0x7f0000061000)) 12:02:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x7b, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xa302, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1068.395711][T18586] loop2: detected capacity change from 0 to 178 [ 1068.398559][T18588] loop4: detected capacity change from 0 to 178 [ 1068.410625][T18590] loop3: detected capacity change from 0 to 128 [ 1068.426155][T18588] Mount JFS Failure: -22 [ 1068.439142][T18588] jfs_mount failed w/return code = -22 12:02:02 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PR_STREAM_STATUS(r0, 0x84, 0x107, &(0x7f00000000c0), &(0x7f0000000100)=0x18) [ 1068.477294][T18586] jfs_mount: Mount Failure: superblock is corrupt! [ 1068.514589][T18586] Mount JFS Failure: -22 12:02:02 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xffffe000, &(0x7f0000061000)) [ 1068.523435][T18586] jfs_mount failed w/return code = -22 12:02:02 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800a}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:02 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000036", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:02 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xe1, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1068.681078][T18618] loop3: detected capacity change from 0 to 128 [ 1068.719118][T18627] loop4: detected capacity change from 0 to 178 12:02:02 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xa502, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1068.731149][T18627] Mount JFS Failure: -22 [ 1068.743006][T18627] jfs_mount failed w/return code = -22 [ 1068.792876][T18635] loop2: detected capacity change from 0 to 178 12:02:02 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000200), &(0x7f0000000240)=0x8) 12:02:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xffffefff, &(0x7f0000061000)) 12:02:03 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xf0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1068.949265][T18635] jfs_mount: Mount Failure: superblock is corrupt! 12:02:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800c}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xb403, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1068.997903][T18635] Mount JFS Failure: -22 [ 1069.015581][T18635] jfs_mount failed w/return code = -22 12:02:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000003c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1069.101810][T18658] loop3: detected capacity change from 0 to 128 12:02:03 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x11a, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1069.196613][T18672] loop4: detected capacity change from 0 to 178 12:02:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfffffdf9, &(0x7f0000061000)) 12:02:03 executing program 1: r0 = socket(0x2, 0x5, 0x0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x25, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) 12:02:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xbe01, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1069.237370][T18680] loop2: detected capacity change from 0 to 178 [ 1069.271272][T18672] Mount JFS Failure: -22 [ 1069.300910][T18680] jfs_mount: Mount Failure: superblock is corrupt! [ 1069.300999][T18672] jfs_mount failed w/return code = -22 [ 1069.309877][T18680] Mount JFS Failure: -22 [ 1069.318490][T18680] jfs_mount failed w/return code = -22 12:02:03 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f00000000c0)='cubic\x00', 0x4) 12:02:03 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x150, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1069.395626][T18694] loop3: detected capacity change from 0 to 128 12:02:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000049", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800d}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xc103, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfffffdfc, &(0x7f0000061000)) 12:02:03 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r1, 0x84, 0xa, &(0x7f0000000180)={0x0, @in, 0x0, 0x0, 0xa}, 0x98) 12:02:03 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x182, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1069.619234][T18721] loop2: detected capacity change from 0 to 178 [ 1069.633701][T18722] loop4: detected capacity change from 0 to 178 [ 1069.661262][T18721] jfs_mount: Mount Failure: superblock is corrupt! [ 1069.666977][T18722] Mount JFS Failure: -22 [ 1069.678321][T18722] jfs_mount failed w/return code = -22 [ 1069.684826][T18727] loop3: detected capacity change from 0 to 128 [ 1069.700080][T18721] Mount JFS Failure: -22 12:02:03 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000300)={0x1c, 0x1c, 0x1}, 0x1c) [ 1069.713588][T18721] jfs_mount failed w/return code = -22 12:02:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfffffdfd, &(0x7f0000061000)) 12:02:03 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xd603, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:03 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1be, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:03 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000051", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:03 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800f}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1069.997295][T18759] loop3: detected capacity change from 0 to 128 12:02:04 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x218, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xd902, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:04 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000480)={&(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x3}, 0x1c, &(0x7f0000000200)=[{&(0x7f0000000280)="01", 0x1}], 0x1, &(0x7f0000000440)=[@prinfo={0x14}], 0x14}, 0x0) 12:02:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xffffff7f, &(0x7f0000061000)) [ 1070.121003][T18780] loop4: detected capacity change from 0 to 178 [ 1070.138290][T18782] loop2: detected capacity change from 0 to 178 [ 1070.173824][T18780] Mount JFS Failure: -22 [ 1070.177962][T18782] jfs_mount: Mount Failure: superblock is corrupt! [ 1070.178200][T18780] jfs_mount failed w/return code = -22 [ 1070.191149][T18782] Mount JFS Failure: -22 [ 1070.198037][T18782] jfs_mount failed w/return code = -22 12:02:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000005d", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1070.267214][T18801] loop3: detected capacity change from 0 to 128 12:02:04 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x26a, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:04 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto(r0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=@un=@file={0xa}, 0xa) 12:02:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xdd03, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8010}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xffffff8c, &(0x7f0000061000)) [ 1070.414890][T18816] loop2: detected capacity change from 0 to 178 [ 1070.436090][T18816] jfs_mount: Mount Failure: superblock is corrupt! [ 1070.442987][T18816] Mount JFS Failure: -22 [ 1070.453154][T18816] jfs_mount failed w/return code = -22 12:02:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xe100, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:04 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000006f", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1070.584338][T18834] loop4: detected capacity change from 0 to 178 [ 1070.595682][T18834] Mount JFS Failure: -22 [ 1070.597476][T18830] loop3: detected capacity change from 0 to 128 [ 1070.600236][T18834] jfs_mount failed w/return code = -22 12:02:04 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x291, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:04 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xf000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:04 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfffffff5, &(0x7f0000061000)) 12:02:04 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) r2 = dup2(r1, r0) connect$inet6(r2, &(0x7f0000000200)={0x1c, 0x1c, 0x1}, 0x21) 12:02:04 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8011}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1070.757781][T18863] loop2: detected capacity change from 0 to 178 [ 1070.828840][T18863] jfs_mount: Mount Failure: superblock is corrupt! [ 1070.857593][T18863] Mount JFS Failure: -22 [ 1070.862864][T18863] jfs_mount failed w/return code = -22 [ 1070.881985][T18882] loop4: detected capacity change from 0 to 178 [ 1070.916095][T18882] Mount JFS Failure: -22 [ 1070.931595][T18883] loop3: detected capacity change from 0 to 128 [ 1070.943155][T18882] jfs_mount failed w/return code = -22 12:02:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xf402, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x28, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x2a3, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x801e}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000000240)={&(0x7f0000000040)=@in6={0x1c, 0x1c, 0x2}, 0x1c, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0), &(0x7f0000000180)=0x90) 12:02:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfffffff6, &(0x7f0000061000)) [ 1071.203717][T18906] loop2: detected capacity change from 0 to 178 [ 1071.218244][T18906] jfs_mount: Mount Failure: superblock is corrupt! [ 1071.229730][T18906] Mount JFS Failure: -22 [ 1071.236561][T18906] jfs_mount failed w/return code = -22 [ 1071.242610][T18918] loop4: detected capacity change from 0 to 178 12:02:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xfa03, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x2a5, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1071.253542][T18918] Mount JFS Failure: -22 [ 1071.258731][T18918] jfs_mount failed w/return code = -22 12:02:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8023}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x31, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1071.345075][T18923] loop3: detected capacity change from 0 to 128 [ 1071.421113][T18946] loop4: detected capacity change from 0 to 178 12:02:05 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f00000027c0)={0x0, 0x0, 0x0}, 0x0) [ 1071.461885][T18946] Mount JFS Failure: -22 12:02:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x2d9, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x20000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1071.488184][T18946] jfs_mount failed w/return code = -22 12:02:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfffffffb, &(0x7f0000061000)) [ 1071.540082][T18955] loop2: detected capacity change from 0 to 178 12:02:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x40000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1071.611099][T18955] jfs_mount: Mount Failure: File System Dirty. [ 1071.639215][T18973] loop3: detected capacity change from 0 to 128 12:02:05 executing program 1: r0 = socket$inet_sctp(0x2, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001600)={&(0x7f0000000340)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f00000015c0)=[@authinfo={0x10}, @sndinfo={0x1c}], 0x2c}, 0x0) 12:02:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8048}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1071.670977][T18955] Mount JFS Failure: -22 12:02:05 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x2f4, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1071.719057][T18955] jfs_mount failed w/return code = -22 12:02:05 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfffffffe, &(0x7f0000061000)) 12:02:05 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x36, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:05 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:05 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f00000000c0)='cdg\x00', 0x4) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0x40, &(0x7f0000000080)='dctcp\x00', 0x6) [ 1071.901905][T18991] loop4: detected capacity change from 0 to 178 [ 1071.967429][T18991] Mount JFS Failure: -22 [ 1071.987911][T19002] loop3: detected capacity change from 0 to 128 [ 1071.994506][T18991] jfs_mount failed w/return code = -22 12:02:06 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x300, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:06 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f0000000000)=@in6={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000180)={0xffffffffffffff5f, 0x1c, 0x2}, 0x1c) sendto(r0, 0x0, 0x0, 0x20101, 0x0, 0x0) [ 1072.036594][T19007] loop2: detected capacity change from 0 to 178 12:02:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x2000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xedc000000000, &(0x7f0000061000)) [ 1072.107034][T19007] jfs_mount: Mount Failure: File System Dirty. [ 1072.113221][T19007] Mount JFS Failure: -22 12:02:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x804c}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:06 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x319, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1072.201970][T19007] jfs_mount failed w/return code = -22 12:02:06 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r2, 0x84, 0x26, 0x0, 0x0) [ 1072.256923][T19038] loop3: detected capacity change from 0 to 128 [ 1072.277450][T19040] loop4: detected capacity change from 0 to 178 12:02:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x3c, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:06 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x31e, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x3000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1072.339086][T19040] Mount JFS Failure: -22 [ 1072.343363][T19040] jfs_mount failed w/return code = -22 12:02:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x1000000000000, &(0x7f0000061000)) 12:02:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x7000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8060}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:06 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup(r0) getsockopt$inet_sctp_SCTP_PR_SUPPORTED(r1, 0x84, 0x26, &(0x7f00000001c0), &(0x7f0000000200)=0x8) [ 1072.570618][T19075] loop2: detected capacity change from 0 to 178 12:02:06 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x34d, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1072.625532][T19075] jfs_mount: Mount Failure: File System Dirty. [ 1072.648651][T19086] loop3: detected capacity change from 0 to 128 [ 1072.659003][T19090] loop4: detected capacity change from 0 to 178 [ 1072.671392][T19090] Mount JFS Failure: -22 [ 1072.677411][T19090] jfs_mount failed w/return code = -22 [ 1072.681737][T19075] Mount JFS Failure: -22 [ 1072.713276][T19075] jfs_mount failed w/return code = -22 12:02:06 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xe000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:06 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8068}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:06 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x7ffffffffffff, &(0x7f0000061000)) 12:02:06 executing program 1: r0 = socket$inet(0x2, 0x5, 0x0) r1 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x3}, 0x1c) r2 = dup2(r1, r0) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f0000000040)={0x1, [0x0]}, &(0x7f0000001700)=0x8) getsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x19, &(0x7f0000000140), &(0x7f00000001c0)=0x8) 12:02:06 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x49, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:06 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x352, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1072.953419][T19111] loop4: detected capacity change from 0 to 178 12:02:07 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x18020000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:07 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x3b4, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1073.003361][T19125] loop3: detected capacity change from 0 to 128 [ 1073.012389][T19111] Mount JFS Failure: -22 [ 1073.025284][T19129] loop2: detected capacity change from 0 to 178 [ 1073.039537][T19129] jfs_mount: Mount Failure: File System Dirty. [ 1073.046339][T19129] Mount JFS Failure: -22 [ 1073.050763][T19129] jfs_mount failed w/return code = -22 [ 1073.068621][T19111] jfs_mount failed w/return code = -22 12:02:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001006000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x20000000000000, &(0x7f0000061000)) 12:02:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x51, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x806c}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:07 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x19030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1073.282231][T19161] loop3: detected capacity change from 0 to 128 [ 1073.310877][T19162] loop2: detected capacity change from 0 to 178 [ 1073.316738][T19164] loop1: detected capacity change from 0 to 178 12:02:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x40000000000000, &(0x7f0000061000)) 12:02:07 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x3c1, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1073.340428][T19162] jfs_mount: Mount Failure: File System Dirty. [ 1073.362816][T19164] Currently only 4K block size supported! [ 1073.376814][T19164] Mount JFS Failure: -22 12:02:07 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1a010000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1073.393905][T19164] jfs_mount failed w/return code = -22 [ 1073.398089][T19162] Mount JFS Failure: -22 [ 1073.406277][T19162] jfs_mount failed w/return code = -22 [ 1073.425955][T19189] loop3: detected capacity change from 0 to 128 [ 1073.431381][T19186] loop4: detected capacity change from 0 to 178 12:02:07 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x3d6, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1073.479404][T19186] Mount JFS Failure: -22 12:02:07 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x5d, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1073.515072][T19186] jfs_mount failed w/return code = -22 12:02:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x80ffff00000000, &(0x7f0000061000)) 12:02:07 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1e030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:07 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x3dd, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1073.684083][T19210] loop1: detected capacity change from 0 to 128 [ 1073.708084][T19210] jfs_mount: Mount Failure: File System Dirty. [ 1073.716843][T19216] loop2: detected capacity change from 0 to 178 [ 1073.724322][T19210] Mount JFS Failure: -22 12:02:07 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8074}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1073.741366][T19210] jfs_mount failed w/return code = -22 [ 1073.761107][T19216] jfs_mount: Mount Failure: File System Dirty. [ 1073.802655][T19224] loop3: detected capacity change from 0 to 128 [ 1073.810689][T19216] Mount JFS Failure: -22 12:02:07 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1073.847516][T19216] jfs_mount failed w/return code = -22 [ 1073.862217][T19235] loop4: detected capacity change from 0 to 178 [ 1073.878194][T19235] Mount JFS Failure: -22 [ 1073.883540][T19235] jfs_mount failed w/return code = -22 12:02:07 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x3fa, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x807a}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xe0ffff00000000, &(0x7f0000061000)) 12:02:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x6f, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:08 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x45000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1074.075520][T19254] loop1: detected capacity change from 0 to 128 12:02:08 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x700, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1074.177334][T19265] loop4: detected capacity change from 0 to 178 [ 1074.194345][T19264] loop2: detected capacity change from 0 to 178 [ 1074.210260][T19254] jfs_mount: Mount Failure: File System Dirty. [ 1074.222495][T19265] Mount JFS Failure: -22 [ 1074.227947][T19265] jfs_mount failed w/return code = -22 [ 1074.237628][T19271] loop3: detected capacity change from 0 to 128 12:02:08 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x46000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1074.280962][T19254] Mount JFS Failure: -22 [ 1074.292092][T19264] jfs_mount: Mount Failure: File System Dirty. [ 1074.295409][T19254] jfs_mount failed w/return code = -22 12:02:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x100000000000000, &(0x7f0000061000)) 12:02:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xff00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1074.344645][T19264] Mount JFS Failure: -22 [ 1074.349874][T19264] jfs_mount failed w/return code = -22 12:02:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:08 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xe00, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1074.405031][T19292] loop3: detected capacity change from 0 to 128 12:02:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x7f00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1074.452104][T19298] loop4: detected capacity change from 0 to 255 [ 1074.479255][T19298] Mount JFS Failure: -22 [ 1074.489369][T19298] jfs_mount failed w/return code = -22 12:02:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x200000000000000, &(0x7f0000061000)) 12:02:08 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x4d030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:08 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="02c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:08 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1802, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1074.640798][T19320] loop1: detected capacity change from 0 to 128 [ 1074.697452][T19320] jfs_mount: Mount Failure: File System Dirty. [ 1074.728053][T19325] loop2: detected capacity change from 0 to 178 [ 1074.742365][T19330] loop3: detected capacity change from 0 to 128 [ 1074.753971][T19320] Mount JFS Failure: -22 [ 1074.759671][T19320] jfs_mount failed w/return code = -22 [ 1074.777633][T19325] Mount JFS Failure: -22 [ 1074.784133][T19325] jfs_mount failed w/return code = -22 [ 1074.810428][T19342] loop4: detected capacity change from 0 to 178 [ 1074.861649][T19342] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1074.861649][T19342] 12:02:08 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x300000000000000, &(0x7f0000061000)) 12:02:08 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1903, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1074.904622][T19342] ERROR: (device loop4): remounting filesystem as read-only [ 1074.913096][T19342] xtLookup: xtSearch returned -5 [ 1074.920281][T19342] read_mapping_page failed! [ 1074.926777][T19342] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1074.950280][T19342] Mount JFS Failure: -5 12:02:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x50010000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8002}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1074.956194][T19342] jfs_mount failed w/return code = -5 [ 1075.032029][T19360] loop1: detected capacity change from 0 to 128 [ 1075.057325][T19360] jfs_mount: Mount Failure: File System Dirty. [ 1075.064019][T19360] Mount JFS Failure: -22 [ 1075.068929][T19360] jfs_mount failed w/return code = -22 12:02:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="03c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x52030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1075.081921][T19367] loop3: detected capacity change from 0 to 128 12:02:09 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1a01, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1075.126756][T19372] loop2: detected capacity change from 0 to 178 [ 1075.147127][T19379] loop4: detected capacity change from 0 to 178 [ 1075.183148][T19372] Mount JFS Failure: -22 [ 1075.183203][T19379] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1075.183203][T19379] [ 1075.222122][T19372] jfs_mount failed w/return code = -22 12:02:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x400000000000000, &(0x7f0000061000)) [ 1075.226014][T19379] ERROR: (device loop4): remounting filesystem as read-only [ 1075.241630][T19379] xtLookup: xtSearch returned -5 [ 1075.247186][T19379] read_mapping_page failed! [ 1075.252526][T19379] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:09 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1e03, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1075.283888][T19379] Mount JFS Failure: -5 [ 1075.288141][T19379] jfs_mount failed w/return code = -5 12:02:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x5c000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8003}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1075.330440][T19402] loop1: detected capacity change from 0 to 128 [ 1075.345949][T19402] jfs_mount: Mount Failure: File System Dirty. [ 1075.352346][T19402] Mount JFS Failure: -22 [ 1075.364348][T19402] jfs_mount failed w/return code = -22 [ 1075.419560][T19408] loop3: detected capacity change from 0 to 128 12:02:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:09 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="04c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1075.533412][T19421] loop2: detected capacity change from 0 to 178 [ 1075.565112][T19421] Mount JFS Failure: -22 [ 1075.578309][T19421] jfs_mount failed w/return code = -22 12:02:09 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x4500, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:09 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x500000000000000, &(0x7f0000061000)) 12:02:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x6a020000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1075.615078][T19430] loop1: detected capacity change from 0 to 128 12:02:09 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8004}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1075.671820][T19430] jfs_mount: Mount Failure: File System Dirty. [ 1075.697340][T19430] Mount JFS Failure: -22 [ 1075.739815][T19430] jfs_mount failed w/return code = -22 [ 1075.766380][T19444] loop3: detected capacity change from 0 to 128 12:02:09 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1075.807849][T19449] loop4: detected capacity change from 0 to 178 [ 1075.824386][T19458] loop2: detected capacity change from 0 to 178 [ 1075.845224][T19449] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1075.845224][T19449] 12:02:09 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x7b000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1075.859985][T19458] Mount JFS Failure: -22 12:02:09 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x4600, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1075.883338][T19458] jfs_mount failed w/return code = -22 12:02:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x600000000000000, &(0x7f0000061000)) [ 1075.932182][T19449] ERROR: (device loop4): remounting filesystem as read-only [ 1075.962066][T19449] xtLookup: xtSearch returned -5 [ 1075.974189][T19449] read_mapping_page failed! [ 1076.005914][T19449] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1076.038919][T19449] Mount JFS Failure: -5 12:02:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8005}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x82010000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:10 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x4d03, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1076.059670][T19449] jfs_mount failed w/return code = -5 [ 1076.072497][T19481] loop1: detected capacity change from 0 to 128 [ 1076.083133][T19481] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1076.089592][T19481] Mount JFS Failure: -5 [ 1076.096123][T19481] jfs_mount failed w/return code = -5 [ 1076.114193][T19486] loop3: detected capacity change from 0 to 128 12:02:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="05c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x700000000000000, &(0x7f0000061000)) 12:02:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x91020000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1076.229499][T19503] loop2: detected capacity change from 0 to 178 [ 1076.264541][T19503] Mount JFS Failure: -22 [ 1076.269907][T19503] jfs_mount failed w/return code = -22 [ 1076.271351][T19512] loop3: detected capacity change from 0 to 128 12:02:10 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x5001, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1076.323141][T19519] loop1: detected capacity change from 0 to 128 12:02:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8006}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1076.378539][T19519] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1076.387167][T19519] Mount JFS Failure: -5 [ 1076.391736][T19519] jfs_mount failed w/return code = -5 12:02:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xa3020000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x800000000000000, &(0x7f0000061000)) 12:02:10 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1076.455001][T19533] loop4: detected capacity change from 0 to 178 12:02:10 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x5203, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1076.519094][T19533] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1076.519094][T19533] [ 1076.535575][T19539] loop2: detected capacity change from 0 to 178 [ 1076.556801][T19550] loop3: detected capacity change from 0 to 128 12:02:10 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x5c00, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xa5020000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1076.598503][T19533] ERROR: (device loop4): remounting filesystem as read-only [ 1076.625862][T19539] Mount JFS Failure: -22 [ 1076.674979][T19539] jfs_mount failed w/return code = -22 [ 1076.681597][T19533] xtLookup: xtSearch returned -5 [ 1076.715877][T19567] loop1: detected capacity change from 0 to 128 [ 1076.725081][T19533] read_mapping_page failed! [ 1076.755157][T19533] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1076.761528][T19533] Mount JFS Failure: -5 [ 1076.778689][T19567] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1076.807280][T19533] jfs_mount failed w/return code = -5 [ 1076.827846][T19567] Mount JFS Failure: -5 [ 1076.832053][T19567] jfs_mount failed w/return code = -5 12:02:10 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x6a02, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:10 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x900000000000000, &(0x7f0000061000)) 12:02:10 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xb4030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:10 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="06c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:10 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8007}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:10 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1076.981649][T19590] loop3: detected capacity change from 0 to 128 12:02:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xa00000000000000, &(0x7f0000061000)) 12:02:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x7b00, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1077.209899][T19608] loop4: detected capacity change from 0 to 178 [ 1077.239937][T19611] loop1: detected capacity change from 0 to 128 12:02:11 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xbe010000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1077.261193][T19612] loop2: detected capacity change from 0 to 178 [ 1077.278798][T19608] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1077.278798][T19608] [ 1077.295895][T19616] loop3: detected capacity change from 0 to 128 [ 1077.309334][T19611] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x8201, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1077.334672][T19612] Mount JFS Failure: -22 [ 1077.358104][T19611] Mount JFS Failure: -5 [ 1077.362568][T19611] jfs_mount failed w/return code = -5 [ 1077.370919][T19608] ERROR: (device loop4): remounting filesystem as read-only [ 1077.379251][T19612] jfs_mount failed w/return code = -22 12:02:11 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xc1030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xb00000000000000, &(0x7f0000061000)) [ 1077.412241][T19608] xtLookup: xtSearch returned -5 [ 1077.447445][T19608] read_mapping_page failed! [ 1077.452399][T19608] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:11 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8008}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1077.492714][T19608] Mount JFS Failure: -5 [ 1077.510690][T19608] jfs_mount failed w/return code = -5 12:02:11 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xd6030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1077.614290][T19652] loop3: detected capacity change from 0 to 128 12:02:11 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="07c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x9102, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1077.692949][T19662] loop1: detected capacity change from 0 to 128 [ 1077.701530][T19658] loop2: detected capacity change from 0 to 178 [ 1077.736234][T19658] Mount JFS Failure: -22 [ 1077.742663][T19662] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:11 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xc00000000000000, &(0x7f0000061000)) 12:02:11 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xa302, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:11 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xd9020000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1077.781134][T19658] jfs_mount failed w/return code = -22 [ 1077.781314][T19677] loop4: detected capacity change from 0 to 178 [ 1077.803847][T19662] Mount JFS Failure: -5 [ 1077.812500][T19662] jfs_mount failed w/return code = -5 [ 1077.819166][T19677] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1077.819166][T19677] [ 1077.862927][T19677] ERROR: (device loop4): remounting filesystem as read-only [ 1077.870771][T19677] xtLookup: xtSearch returned -5 [ 1077.876098][T19677] read_mapping_page failed! [ 1077.880860][T19677] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1077.887694][T19677] Mount JFS Failure: -5 [ 1077.891901][T19677] jfs_mount failed w/return code = -5 [ 1077.919762][T19692] loop3: detected capacity change from 0 to 128 12:02:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="08c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xdd030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:12 executing program 1: mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xa502, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8009}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xd00000000000000, &(0x7f0000061000)) [ 1078.136224][T19729] loop4: detected capacity change from 0 to 178 12:02:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xb403, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xe1000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1078.176870][T19729] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1078.176870][T19729] [ 1078.187506][T19743] loop3: detected capacity change from 0 to 128 [ 1078.234548][T19729] ERROR: (device loop4): remounting filesystem as read-only [ 1078.234666][T19748] loop1: detected capacity change from 0 to 128 [ 1078.242719][T19729] xtLookup: xtSearch returned -5 [ 1078.248704][T19747] loop2: detected capacity change from 0 to 178 [ 1078.256010][T19729] read_mapping_page failed! [ 1078.265972][T19729] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1078.273190][T19729] Mount JFS Failure: -5 [ 1078.279769][T19729] jfs_mount failed w/return code = -5 12:02:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xf00000000000000, &(0x7f0000061000)) [ 1078.323464][T19747] Mount JFS Failure: -22 [ 1078.334093][T19748] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1078.341425][T19748] Mount JFS Failure: -5 [ 1078.349628][T19748] jfs_mount failed w/return code = -5 [ 1078.351910][T19747] jfs_mount failed w/return code = -22 12:02:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="09c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xf0000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xbe01, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:12 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1078.452544][T19774] loop3: detected capacity change from 0 to 128 12:02:12 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x1000000000000000, &(0x7f0000061000)) 12:02:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xf4020000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xc103, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:12 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800a}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1078.575560][T19798] loop4: detected capacity change from 0 to 178 [ 1078.656383][T19798] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1078.656383][T19798] [ 1078.682597][T19798] ERROR: (device loop4): remounting filesystem as read-only [ 1078.691265][T19798] xtLookup: xtSearch returned -5 [ 1078.696459][T19798] read_mapping_page failed! [ 1078.701016][T19798] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1078.713884][T19798] Mount JFS Failure: -5 [ 1078.718085][T19798] jfs_mount failed w/return code = -5 [ 1078.737154][T19806] loop1: detected capacity change from 0 to 128 [ 1078.740179][T19816] loop2: detected capacity change from 0 to 178 12:02:12 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xd603, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1078.755059][T19816] Mount JFS Failure: -22 [ 1078.759357][T19816] jfs_mount failed w/return code = -22 12:02:12 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0ac4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1078.822934][T19806] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1078.836281][T19825] loop3: detected capacity change from 0 to 128 12:02:12 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xfa030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1078.879460][T19806] Mount JFS Failure: -5 [ 1078.884672][T19806] jfs_mount failed w/return code = -5 [ 1078.905496][T19832] loop4: detected capacity change from 0 to 178 12:02:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800c}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1078.940297][T19832] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1078.940297][T19832] 12:02:13 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xd902, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:13 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x1100000000000000, &(0x7f0000061000)) [ 1078.994190][T19832] ERROR: (device loop4): remounting filesystem as read-only [ 1079.003584][T19832] xtLookup: xtSearch returned -5 [ 1079.010043][T19832] read_mapping_page failed! [ 1079.016886][T19832] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1079.023593][T19832] Mount JFS Failure: -5 [ 1079.029215][T19832] jfs_mount failed w/return code = -5 12:02:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0x108, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1079.066862][T19854] loop2: detected capacity change from 0 to 178 [ 1079.109257][T19854] Mount JFS Failure: -22 12:02:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0bc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1079.132936][T19864] loop3: detected capacity change from 0 to 128 [ 1079.149258][T19854] jfs_mount failed w/return code = -22 [ 1079.225879][T19879] loop1: detected capacity change from 0 to 128 12:02:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc7}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800d}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1079.272011][T19879] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1079.279630][T19879] Mount JFS Failure: -5 12:02:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x1f00000000000000, &(0x7f0000061000)) 12:02:13 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xdd03, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1079.345197][T19879] jfs_mount failed w/return code = -5 12:02:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1079.392907][T19901] loop3: detected capacity change from 0 to 128 [ 1079.445012][T19891] loop4: detected capacity change from 0 to 178 [ 1079.464089][T19891] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1079.464089][T19891] 12:02:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x2000000000000000, &(0x7f0000061000)) [ 1079.495588][T19891] ERROR: (device loop4): remounting filesystem as read-only 12:02:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:13 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1079.574175][T19911] loop2: detected capacity change from 0 to 178 [ 1079.580932][T19924] loop3: detected capacity change from 0 to 128 [ 1079.589146][T19891] xtLookup: xtSearch returned -5 12:02:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x2}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1079.624127][T19911] Mount JFS Failure: -22 [ 1079.638059][T19891] read_mapping_page failed! [ 1079.643944][T19911] jfs_mount failed w/return code = -22 12:02:13 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x2010000000000000, &(0x7f0000061000)) [ 1079.665493][T19891] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1079.673652][T19943] loop1: detected capacity change from 0 to 128 [ 1079.685802][T19943] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1079.692883][T19943] Mount JFS Failure: -5 [ 1079.697124][T19943] jfs_mount failed w/return code = -5 [ 1079.752627][T19891] Mount JFS Failure: -5 12:02:13 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800f}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1079.788343][T19891] jfs_mount failed w/return code = -5 12:02:13 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0cc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:13 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xe100, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:13 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x3}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1079.867364][T19957] loop3: detected capacity change from 0 to 128 [ 1079.920632][T19962] loop2: detected capacity change from 0 to 178 [ 1079.961070][T19962] Mount JFS Failure: -22 [ 1079.966851][T19962] jfs_mount failed w/return code = -22 [ 1079.974982][T19976] loop4: detected capacity change from 0 to 178 [ 1079.984048][T19976] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1079.984048][T19976] [ 1079.996021][T19976] ERROR: (device loop4): remounting filesystem as read-only 12:02:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xf000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1080.011296][T19976] xtLookup: xtSearch returned -5 [ 1080.084805][T19976] read_mapping_page failed! 12:02:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x2300000000000000, &(0x7f0000061000)) 12:02:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x4}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1080.155691][T19976] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1080.192881][T19976] Mount JFS Failure: -5 12:02:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xf402, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8010}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1080.208142][T19976] jfs_mount failed w/return code = -5 [ 1080.281545][T20007] loop3: detected capacity change from 0 to 128 12:02:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0dc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x7}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xfa03, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1080.334644][T20021] loop2: detected capacity change from 0 to 178 [ 1080.348712][T20021] Mount JFS Failure: -22 [ 1080.354061][T20021] jfs_mount failed w/return code = -22 12:02:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8011}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x3f00000000000000, &(0x7f0000061000)) 12:02:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1080.489364][T20036] loop4: detected capacity change from 0 to 178 [ 1080.505701][T20036] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1080.505701][T20036] 12:02:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xe}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1080.568926][T20036] ERROR: (device loop4): remounting filesystem as read-only [ 1080.594031][T20056] loop2: detected capacity change from 0 to 178 [ 1080.609712][T20036] xtLookup: xtSearch returned -5 12:02:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x20000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1080.617491][T20056] Mount JFS Failure: -22 [ 1080.621782][T20056] jfs_mount failed w/return code = -22 [ 1080.640515][T20061] loop3: detected capacity change from 0 to 128 [ 1080.651683][T20036] read_mapping_page failed! 12:02:14 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x45}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1080.681015][T20036] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1080.688085][T20036] Mount JFS Failure: -5 [ 1080.692564][T20036] jfs_mount failed w/return code = -5 [ 1080.699160][T20069] loop1: detected capacity change from 0 to 128 12:02:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x40000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8023}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1080.781106][T20069] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:14 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0ec4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:14 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:14 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x4000000000000000, &(0x7f0000061000)) [ 1080.900975][T20069] Mount JFS Failure: -5 12:02:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x46}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x2000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1080.936225][T20069] jfs_mount failed w/return code = -5 12:02:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1081.007314][T20107] loop2: detected capacity change from 0 to 178 [ 1081.009491][T20112] loop4: detected capacity change from 0 to 178 [ 1081.046226][T20107] Mount JFS Failure: -22 [ 1081.051751][T20107] jfs_mount failed w/return code = -22 [ 1081.067421][T20118] loop3: detected capacity change from 0 to 128 [ 1081.082580][T20112] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1081.082580][T20112] 12:02:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x3000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1081.137287][T20112] ERROR: (device loop4): remounting filesystem as read-only 12:02:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x7000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8036}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x4800000000000000, &(0x7f0000061000)) 12:02:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x5c}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1081.199960][T20112] xtLookup: xtSearch returned -5 [ 1081.217902][T20112] read_mapping_page failed! [ 1081.231133][T20112] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1081.262506][T20147] loop1: detected capacity change from 0 to 128 [ 1081.269763][T20112] Mount JFS Failure: -5 [ 1081.283329][T20147] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1081.290731][T20147] Mount JFS Failure: -5 [ 1081.297648][T20147] jfs_mount failed w/return code = -5 [ 1081.298011][T20112] jfs_mount failed w/return code = -5 12:02:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x10, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1081.350163][T20154] loop3: detected capacity change from 0 to 128 [ 1081.419479][T20167] loop2: detected capacity change from 0 to 178 12:02:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0fc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xe000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x4c00000000000000, &(0x7f0000061000)) 12:02:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x7b}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1081.467093][T20167] Mount JFS Failure: -22 [ 1081.471730][T20167] jfs_mount failed w/return code = -22 12:02:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8037}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xe1}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1081.586974][T20189] loop1: detected capacity change from 0 to 128 [ 1081.595974][T20186] loop4: detected capacity change from 0 to 178 12:02:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x18020000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1081.628725][T20189] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1081.635545][T20189] Mount JFS Failure: -5 [ 1081.640430][T20189] jfs_mount failed w/return code = -5 [ 1081.647139][T20186] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1081.647139][T20186] [ 1081.677678][T20205] loop2: detected capacity change from 0 to 178 [ 1081.693490][T20205] Mount JFS Failure: -22 [ 1081.703604][T20205] jfs_mount failed w/return code = -22 [ 1081.710726][T20186] ERROR: (device loop4): remounting filesystem as read-only [ 1081.718602][T20186] xtLookup: xtSearch returned -5 [ 1081.724280][T20186] read_mapping_page failed! 12:02:15 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1081.729195][T20186] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1081.736018][T20186] Mount JFS Failure: -5 [ 1081.740908][T20186] jfs_mount failed w/return code = -5 [ 1081.745297][T20209] loop3: detected capacity change from 0 to 128 12:02:15 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xf0}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8038}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:15 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x19030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x6000000000000000, &(0x7f0000061000)) 12:02:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="11c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1081.953343][T20229] loop1: detected capacity change from 0 to 128 12:02:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x11a}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1082.038861][T20244] loop2: detected capacity change from 0 to 178 [ 1082.051179][T20229] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1082.060812][T20247] loop4: detected capacity change from 0 to 178 [ 1082.068561][T20244] Mount JFS Failure: -22 [ 1082.074681][T20241] loop3: detected capacity change from 0 to 128 [ 1082.084447][T20229] Mount JFS Failure: -5 12:02:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1a010000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1082.090192][T20244] jfs_mount failed w/return code = -22 [ 1082.101095][T20247] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1082.101095][T20247] [ 1082.129385][T20229] jfs_mount failed w/return code = -5 12:02:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x150}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1082.144097][T20247] ERROR: (device loop4): remounting filesystem as read-only [ 1082.152742][T20247] xtLookup: xtSearch returned -5 [ 1082.168016][T20247] read_mapping_page failed! [ 1082.172819][T20247] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1082.181138][T20247] Mount JFS Failure: -5 [ 1082.187613][T20247] jfs_mount failed w/return code = -5 12:02:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x6800000000000000, &(0x7f0000061000)) 12:02:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8048}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x1e030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="12c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x182}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1082.460936][T20289] loop2: detected capacity change from 0 to 178 [ 1082.490626][T20289] Mount JFS Failure: -22 [ 1082.498216][T20289] jfs_mount failed w/return code = -22 12:02:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x45000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1082.505745][T20297] loop1: detected capacity change from 0 to 128 [ 1082.505745][T20292] loop3: detected capacity change from 0 to 128 [ 1082.522611][T20296] loop4: detected capacity change from 0 to 178 [ 1082.534246][T20297] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1082.541511][T20297] Mount JFS Failure: -5 [ 1082.561160][T20296] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1082.561160][T20296] [ 1082.572384][T20296] ERROR: (device loop4): remounting filesystem as read-only [ 1082.583381][T20297] jfs_mount failed w/return code = -5 [ 1082.590569][T20296] xtLookup: xtSearch returned -5 [ 1082.596422][T20296] read_mapping_page failed! [ 1082.601337][T20296] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:16 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x6c00000000000000, &(0x7f0000061000)) [ 1082.608356][T20296] Mount JFS Failure: -5 [ 1082.612904][T20296] jfs_mount failed w/return code = -5 12:02:16 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x804c}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1be}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:16 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x46000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="2fc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1082.795798][T20343] loop3: detected capacity change from 0 to 128 [ 1082.799595][T20341] loop2: detected capacity change from 0 to 178 12:02:16 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x218}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1082.846805][T20353] loop1: detected capacity change from 0 to 128 [ 1082.850240][T20341] Mount JFS Failure: -22 12:02:16 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x4d030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1082.915757][T20353] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1082.927427][T20341] jfs_mount failed w/return code = -22 [ 1082.935470][T20361] loop4: detected capacity change from 0 to 178 [ 1083.009694][T20353] Mount JFS Failure: -5 [ 1083.021913][T20353] jfs_mount failed w/return code = -5 12:02:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x7400000000000000, &(0x7f0000061000)) [ 1083.080155][T20361] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1083.080155][T20361] 12:02:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8060}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x26a}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:17 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x50010000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1083.227991][T20361] ERROR: (device loop4): remounting filesystem as read-only [ 1083.243869][T20361] xtLookup: xtSearch returned -5 [ 1083.259008][T20361] read_mapping_page failed! [ 1083.281120][T20361] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1083.301513][T20382] loop3: detected capacity change from 0 to 128 [ 1083.312452][T20361] Mount JFS Failure: -5 [ 1083.319320][T20388] loop2: detected capacity change from 0 to 178 [ 1083.331229][T20361] jfs_mount failed w/return code = -5 [ 1083.351326][T20388] Mount JFS Failure: -22 [ 1083.360953][T20393] loop1: detected capacity change from 0 to 128 [ 1083.364135][T20388] jfs_mount failed w/return code = -22 12:02:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x291}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:17 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="31c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:17 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x52030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x2a3}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1083.481545][T20393] jfs_mount: Mount Failure: File System Dirty. 12:02:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x7a00000000000000, &(0x7f0000061000)) [ 1083.542462][T20393] Mount JFS Failure: -22 12:02:17 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8068}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1083.570779][T20393] jfs_mount failed w/return code = -22 [ 1083.657856][T20431] loop4: detected capacity change from 0 to 178 12:02:17 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1083.702016][T20431] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1083.702016][T20431] [ 1083.713908][T20431] ERROR: (device loop4): remounting filesystem as read-only [ 1083.722332][T20431] xtLookup: xtSearch returned -5 12:02:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x2a5}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1083.745720][T20431] read_mapping_page failed! [ 1083.776533][T20445] loop3: detected capacity change from 0 to 128 [ 1083.786973][T20431] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1083.795108][T20444] loop2: detected capacity change from 0 to 178 [ 1083.805893][T20431] Mount JFS Failure: -5 12:02:17 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x5c000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1083.828601][T20444] Mount JFS Failure: -22 [ 1083.834585][T20444] jfs_mount failed w/return code = -22 [ 1083.841574][T20431] jfs_mount failed w/return code = -5 12:02:17 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x7a14d76000000000, &(0x7f0000061000)) 12:02:17 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x2d9}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x806c}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1083.943987][T20464] loop1: detected capacity change from 0 to 128 [ 1083.962103][T20464] jfs_mount: Mount Failure: File System Dirty. [ 1083.969987][T20464] Mount JFS Failure: -22 [ 1083.975486][T20464] jfs_mount failed w/return code = -22 12:02:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="36c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x2f4}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1084.039009][T20475] loop2: detected capacity change from 0 to 178 [ 1084.053136][T20475] Mount JFS Failure: -22 [ 1084.058498][T20475] jfs_mount failed w/return code = -22 12:02:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x6a020000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8074}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1084.173257][T20484] loop3: detected capacity change from 0 to 128 [ 1084.211046][T20490] loop4: detected capacity change from 0 to 178 [ 1084.267277][T20490] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1084.267277][T20490] [ 1084.278342][T20490] ERROR: (device loop4): remounting filesystem as read-only [ 1084.288317][T20490] xtLookup: xtSearch returned -5 [ 1084.310939][T20506] loop1: detected capacity change from 0 to 128 12:02:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x7fffffffffffffff, &(0x7f0000061000)) [ 1084.328657][T20490] read_mapping_page failed! 12:02:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x7b000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1084.372690][T20511] loop2: detected capacity change from 0 to 178 [ 1084.380008][T20506] jfs_mount: Mount Failure: File System Dirty. [ 1084.399550][T20490] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x300}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1084.443892][T20506] Mount JFS Failure: -22 [ 1084.448594][T20506] jfs_mount failed w/return code = -22 [ 1084.460406][T20490] Mount JFS Failure: -5 [ 1084.460960][T20511] Mount JFS Failure: -22 [ 1084.465034][T20490] jfs_mount failed w/return code = -5 12:02:18 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x82010000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:18 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="3cc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1084.511752][T20511] jfs_mount failed w/return code = -22 12:02:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1084.594527][T20528] loop3: detected capacity change from 0 to 128 12:02:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x807a}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1084.708818][T20541] loop1: detected capacity change from 0 to 128 [ 1084.748717][T20544] loop4: detected capacity change from 0 to 178 12:02:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x8cffffff00000000, &(0x7f0000061000)) 12:02:18 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x319}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1084.760898][T20541] jfs_mount: Mount Failure: File System Dirty. [ 1084.774810][T20541] Mount JFS Failure: -22 [ 1084.779247][T20541] jfs_mount failed w/return code = -22 [ 1084.819725][T20544] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1084.819725][T20544] [ 1084.820818][T20556] loop2: detected capacity change from 0 to 178 [ 1084.845134][T20556] Mount JFS Failure: -22 [ 1084.849499][T20556] jfs_mount failed w/return code = -22 [ 1084.856183][T20544] ERROR: (device loop4): remounting filesystem as read-only [ 1084.863562][T20544] xtLookup: xtSearch returned -5 12:02:18 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1084.868832][T20544] read_mapping_page failed! [ 1084.873463][T20544] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1084.880653][T20544] Mount JFS Failure: -5 [ 1084.888505][T20544] jfs_mount failed w/return code = -5 12:02:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xff00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x91020000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:19 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x31e}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="44c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1085.025935][T20574] loop3: detected capacity change from 0 to 128 [ 1085.109120][T20583] loop2: detected capacity change from 0 to 255 [ 1085.138262][T20587] loop4: detected capacity change from 0 to 178 12:02:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xa3020000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:19 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x34d}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1085.153304][T20590] loop1: detected capacity change from 0 to 128 12:02:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xa5020000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xa316000000000000, &(0x7f0000061000)) [ 1085.197758][T20587] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1085.197758][T20587] [ 1085.216365][T20590] jfs_mount: Mount Failure: File System Dirty. [ 1085.228847][T20583] Mount JFS Failure: -22 [ 1085.261595][T20583] jfs_mount failed w/return code = -22 [ 1085.273578][T20590] Mount JFS Failure: -22 [ 1085.292382][T20587] ERROR: (device loop4): remounting filesystem as read-only 12:02:19 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x352}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1085.309274][T20590] jfs_mount failed w/return code = -22 [ 1085.338153][T20587] xtLookup: xtSearch returned -5 [ 1085.359312][T20587] read_mapping_page failed! 12:02:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xb4030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1085.392798][T20628] loop3: detected capacity change from 0 to 128 [ 1085.397693][T20587] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="02c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:19 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, 0x0, 0x0, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1085.443967][T20587] Mount JFS Failure: -5 [ 1085.448357][T20587] jfs_mount failed w/return code = -5 12:02:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xab16000000000000, &(0x7f0000061000)) [ 1085.509134][T20640] loop2: detected capacity change from 0 to 178 [ 1085.521999][T20640] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1085.521999][T20640] [ 1085.536470][T20640] ERROR: (device loop2): remounting filesystem as read-only 12:02:19 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x3b4}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1085.578236][T20640] xtLookup: xtSearch returned -5 [ 1085.585505][T20640] read_mapping_page failed! [ 1085.590963][T20640] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1085.600712][T20640] Mount JFS Failure: -5 [ 1085.606481][T20640] jfs_mount failed w/return code = -5 [ 1085.613407][T20653] loop1: detected capacity change from 0 to 128 12:02:19 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="49c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1085.629017][T20653] jfs_mount: Mount Failure: File System Dirty. 12:02:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xbe010000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1085.672553][T20653] Mount JFS Failure: -22 [ 1085.722097][T20653] jfs_mount failed w/return code = -22 [ 1085.744620][T20661] loop3: detected capacity change from 0 to 128 12:02:19 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="03c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xad16000000000000, &(0x7f0000061000)) 12:02:19 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x3c1}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1085.866465][T20677] loop4: detected capacity change from 0 to 178 12:02:19 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xc1030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1085.936626][T20686] loop3: detected capacity change from 0 to 128 [ 1085.946700][T20677] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1085.946700][T20677] [ 1085.951779][T20681] loop2: detected capacity change from 0 to 178 [ 1085.959312][T20677] ERROR: (device loop4): remounting filesystem as read-only [ 1085.971958][T20677] xtLookup: xtSearch returned -5 [ 1085.978062][T20677] read_mapping_page failed! [ 1085.982586][T20677] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1085.988956][T20677] Mount JFS Failure: -5 [ 1085.994254][T20677] jfs_mount failed w/return code = -5 12:02:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xd6030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xf5ffffff00000000, &(0x7f0000061000)) 12:02:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="51c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1086.084389][T20681] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1086.084389][T20681] [ 1086.129905][T20707] loop3: detected capacity change from 0 to 128 [ 1086.155503][T20681] ERROR: (device loop2): remounting filesystem as read-only [ 1086.174168][T20719] loop1: detected capacity change from 0 to 128 12:02:20 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x3d6}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:20 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x3dd}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1086.223352][T20725] loop4: detected capacity change from 0 to 178 [ 1086.256721][T20681] xtLookup: xtSearch returned -5 [ 1086.266257][T20719] jfs_mount: Mount Failure: File System Dirty. 12:02:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xd9020000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1086.273558][T20719] Mount JFS Failure: -22 [ 1086.279459][T20719] jfs_mount failed w/return code = -22 [ 1086.286996][T20681] read_mapping_page failed! [ 1086.297198][T20681] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1086.312786][T20725] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1086.312786][T20725] 12:02:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xf6ffffff00000000, &(0x7f0000061000)) [ 1086.342929][T20681] Mount JFS Failure: -5 [ 1086.349165][T20681] jfs_mount failed w/return code = -5 [ 1086.360938][T20725] ERROR: (device loop4): remounting filesystem as read-only [ 1086.371590][T20725] xtLookup: xtSearch returned -5 [ 1086.379085][T20725] read_mapping_page failed! [ 1086.385951][T20725] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1086.421684][T20725] Mount JFS Failure: -5 [ 1086.441473][T20725] jfs_mount failed w/return code = -5 12:02:20 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="04c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xdd030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:20 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x3fa}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1086.487583][T20750] loop3: detected capacity change from 0 to 128 12:02:20 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="5dc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:20 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xf9fdffff00000000, &(0x7f0000061000)) 12:02:20 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xe1000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1086.644496][T20765] loop1: detected capacity change from 0 to 128 [ 1086.714459][T20765] jfs_mount: Mount Failure: File System Dirty. [ 1086.720928][T20778] loop2: detected capacity change from 0 to 178 [ 1086.730480][T20782] loop3: detected capacity change from 0 to 128 12:02:20 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x700}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1086.766679][T20785] loop4: detected capacity change from 0 to 178 [ 1086.782231][T20765] Mount JFS Failure: -22 [ 1086.832718][T20778] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1086.832718][T20778] [ 1086.840052][T20785] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1086.840052][T20785] [ 1086.862813][T20785] ERROR: (device loop4): remounting filesystem as read-only [ 1086.871000][T20785] xtLookup: xtSearch returned -5 [ 1086.876662][T20785] read_mapping_page failed! [ 1086.882235][T20785] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1086.890256][T20785] Mount JFS Failure: -5 [ 1086.891637][T20765] jfs_mount failed w/return code = -22 [ 1086.895047][T20785] jfs_mount failed w/return code = -5 12:02:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfbffffff00000000, &(0x7f0000061000)) 12:02:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xf0000000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="6fc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1086.940803][T20778] ERROR: (device loop2): remounting filesystem as read-only [ 1086.949174][T20778] xtLookup: xtSearch returned -5 [ 1086.955355][T20778] read_mapping_page failed! [ 1086.960329][T20778] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1086.973053][T20778] Mount JFS Failure: -5 [ 1086.977892][T20778] jfs_mount failed w/return code = -5 12:02:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1087.089372][T20811] loop3: detected capacity change from 0 to 128 12:02:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="05c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xe00}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1087.176348][T20819] loop4: detected capacity change from 0 to 178 12:02:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfcfdffff00000000, &(0x7f0000061000)) 12:02:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xf4020000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1087.251400][T20819] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1087.251400][T20819] [ 1087.319606][T20833] loop1: detected capacity change from 0 to 128 [ 1087.358044][T20833] jfs_mount: Mount Failure: File System Dirty. [ 1087.395801][T20819] ERROR: (device loop4): remounting filesystem as read-only [ 1087.440274][T20845] loop3: detected capacity change from 0 to 128 [ 1087.462975][T20833] Mount JFS Failure: -22 [ 1087.471465][T20849] loop2: detected capacity change from 0 to 178 [ 1087.496477][T20849] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1087.496477][T20849] [ 1087.498232][T20819] xtLookup: xtSearch returned -5 [ 1087.511012][T20849] ERROR: (device loop2): remounting filesystem as read-only [ 1087.523131][T20849] xtLookup: xtSearch returned -5 [ 1087.530094][T20849] read_mapping_page failed! [ 1087.535400][T20849] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1087.541756][T20849] Mount JFS Failure: -5 12:02:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0xfa030000, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1802}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1087.546126][T20849] jfs_mount failed w/return code = -5 [ 1087.550467][T20833] jfs_mount failed w/return code = -22 12:02:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfdfdffff00000000, &(0x7f0000061000)) 12:02:21 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="06c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1087.667398][T20819] read_mapping_page failed! 12:02:21 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1903}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1087.747332][T20819] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1087.787264][T20819] Mount JFS Failure: -5 [ 1087.792858][T20876] loop3: detected capacity change from 0 to 128 [ 1087.817963][T20819] jfs_mount failed w/return code = -5 12:02:21 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c40a5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:21 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0x108, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:21 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfeffffff00000000, &(0x7f0000061000)) 12:02:21 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1a01}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1087.899588][T20892] loop2: detected capacity change from 0 to 178 [ 1087.969633][T20892] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1087.969633][T20892] [ 1087.980537][T20903] loop1: detected capacity change from 0 to 128 12:02:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc7}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1088.043143][T20892] ERROR: (device loop2): remounting filesystem as read-only [ 1088.067968][T20892] xtLookup: xtSearch returned -5 [ 1088.073395][T20919] loop4: detected capacity change from 0 to 178 [ 1088.084765][T20892] read_mapping_page failed! [ 1088.090783][T20919] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1088.090783][T20919] [ 1088.102457][T20919] ERROR: (device loop4): remounting filesystem as read-only [ 1088.110295][T20919] xtLookup: xtSearch returned -5 [ 1088.115898][T20919] read_mapping_page failed! [ 1088.120446][T20919] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1088.124712][T20918] loop3: detected capacity change from 0 to 128 [ 1088.127759][T20919] Mount JFS Failure: -5 12:02:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:22 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1e03}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1088.138498][T20919] jfs_mount failed w/return code = -5 [ 1088.159745][T20892] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1088.208367][T20892] Mount JFS Failure: -5 12:02:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4235f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1088.243101][T20892] jfs_mount failed w/return code = -5 12:02:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfeffffffffffffff, &(0x7f0000061000)) 12:02:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="07c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xd0}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:22 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x4500}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1088.425113][T20959] loop1: detected capacity change from 0 to 128 [ 1088.443931][T20965] loop3: detected capacity change from 0 to 128 [ 1088.461949][T20964] loop4: detected capacity change from 0 to 178 [ 1088.472487][T20976] loop2: detected capacity change from 0 to 178 [ 1088.484329][T20976] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1088.484329][T20976] [ 1088.494955][T20976] ERROR: (device loop2): remounting filesystem as read-only [ 1088.503669][T20976] xtLookup: xtSearch returned -5 [ 1088.509433][T20976] read_mapping_page failed! [ 1088.513644][T20964] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1088.513644][T20964] 12:02:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1088.515577][T20976] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1088.531175][T20976] Mount JFS Failure: -5 [ 1088.535959][T20976] jfs_mount failed w/return code = -5 [ 1088.556477][T20964] ERROR: (device loop4): remounting filesystem as read-only 12:02:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:22 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="08c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1088.571944][T20964] xtLookup: xtSearch returned -5 [ 1088.592151][T20964] read_mapping_page failed! [ 1088.604375][T20964] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:22 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xff00000000000000, &(0x7f0000061000)) [ 1088.647854][T20964] Mount JFS Failure: -5 [ 1088.652314][T20964] jfs_mount failed w/return code = -5 12:02:22 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x4600}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1088.733092][T21002] loop2: detected capacity change from 0 to 178 [ 1088.742542][T21005] loop3: detected capacity change from 0 to 128 12:02:22 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x2}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:22 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4255f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1088.799729][T21002] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1088.799729][T21002] [ 1088.811106][T21002] ERROR: (device loop2): remounting filesystem as read-only [ 1088.819024][T21002] xtLookup: xtSearch returned -5 [ 1088.825802][T21002] read_mapping_page failed! [ 1088.832576][T21002] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1088.839494][T21002] Mount JFS Failure: -5 [ 1088.845454][T21019] loop1: detected capacity change from 0 to 128 [ 1088.856957][T21002] jfs_mount failed w/return code = -5 12:02:22 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x4d03}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="09c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xff0f000000000000, &(0x7f0000061000)) [ 1088.992166][T21034] loop4: detected capacity change from 0 to 178 [ 1089.043339][T21034] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.043339][T21034] [ 1089.082033][T21048] loop2: detected capacity change from 0 to 178 12:02:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x3}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1089.083027][T21034] ERROR: (device loop4): remounting filesystem as read-only [ 1089.102460][T21052] loop1: detected capacity change from 0 to 128 [ 1089.110093][T21034] xtLookup: xtSearch returned -5 [ 1089.115848][T21034] read_mapping_page failed! [ 1089.120401][T21034] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1089.126794][T21034] Mount JFS Failure: -5 [ 1089.130957][T21034] jfs_mount failed w/return code = -5 [ 1089.140910][T21048] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.140910][T21048] 12:02:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x5001}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42a5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x4}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1089.248442][T21048] ERROR: (device loop2): remounting filesystem as read-only [ 1089.268033][T21062] loop3: detected capacity change from 0 to 128 [ 1089.319306][T21048] xtLookup: xtSearch returned -5 [ 1089.361943][T21048] read_mapping_page failed! 12:02:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xffefffff00000000, &(0x7f0000061000)) 12:02:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x5203}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1089.385851][T21048] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1089.412018][T21048] Mount JFS Failure: -5 [ 1089.414842][T21088] loop1: detected capacity change from 0 to 128 [ 1089.419570][T21087] loop4: detected capacity change from 0 to 178 12:02:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x7}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1089.454423][T21048] jfs_mount failed w/return code = -5 12:02:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), 0x0, 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)) [ 1089.511437][T21087] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.511437][T21087] [ 1089.536172][T21087] ERROR: (device loop4): remounting filesystem as read-only [ 1089.544080][T21087] xtLookup: xtSearch returned -5 [ 1089.549315][T21087] read_mapping_page failed! [ 1089.555491][T21087] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:23 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0ac4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1089.562732][T21087] Mount JFS Failure: -5 [ 1089.567431][T21087] jfs_mount failed w/return code = -5 12:02:23 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xe}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:23 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x5c00}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1089.641162][T21115] loop3: detected capacity change from 0 to 128 12:02:23 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42b5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xffffff7f00000000, &(0x7f0000061000)) [ 1089.777234][T21141] loop1: detected capacity change from 0 to 128 [ 1089.809009][T21128] loop2: detected capacity change from 0 to 178 12:02:23 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000061000)) [ 1089.875264][T21155] loop4: detected capacity change from 0 to 178 [ 1089.894198][T21128] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.894198][T21128] [ 1089.913150][T21152] loop3: detected capacity change from 0 to 128 12:02:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x6a02}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x45}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1089.994599][T21128] ERROR: (device loop2): remounting filesystem as read-only [ 1089.997373][T21155] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.997373][T21155] [ 1090.002108][T21128] xtLookup: xtSearch returned -5 [ 1090.002128][T21128] read_mapping_page failed! [ 1090.002173][T21128] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1090.002270][T21128] Mount JFS Failure: -5 [ 1090.047859][T21128] jfs_mount failed w/return code = -5 12:02:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x46}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xffffffff00000000, &(0x7f0000061000)) 12:02:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0bc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1090.117191][T21155] ERROR: (device loop4): remounting filesystem as read-only 12:02:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000061000)) 12:02:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x7b00}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1090.180266][T21155] xtLookup: xtSearch returned -5 12:02:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x5c}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1090.211279][T21155] read_mapping_page failed! [ 1090.228703][T21155] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1090.269746][T21155] Mount JFS Failure: -5 [ 1090.293063][T21155] jfs_mount failed w/return code = -5 [ 1090.323596][T21195] loop3: detected capacity change from 0 to 128 [ 1090.330732][T21194] loop2: detected capacity change from 0 to 178 12:02:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x8201}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1090.369140][T21194] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1090.369140][T21194] [ 1090.481638][T21194] ERROR: (device loop2): remounting filesystem as read-only [ 1090.507833][T21194] xtLookup: xtSearch returned -5 [ 1090.527882][T21194] read_mapping_page failed! 12:02:24 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42d5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000061000)) 12:02:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x7b}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:24 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xffffffffffff0700, &(0x7f0000061000)) [ 1090.554101][T21194] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1090.577097][T21194] Mount JFS Failure: -5 [ 1090.591240][T21194] jfs_mount failed w/return code = -5 12:02:24 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xe1}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:24 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0cc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:24 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000061000)) [ 1090.734706][T21235] loop4: detected capacity change from 0 to 178 [ 1090.735962][T21234] loop3: detected capacity change from 0 to 128 [ 1090.763702][T21235] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1090.763702][T21235] [ 1090.777189][T21235] ERROR: (device loop4): remounting filesystem as read-only 12:02:24 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x9102}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1090.785950][T21235] xtLookup: xtSearch returned -5 [ 1090.791040][T21235] read_mapping_page failed! [ 1090.796165][T21235] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1090.802553][T21235] Mount JFS Failure: -5 [ 1090.807229][T21235] jfs_mount failed w/return code = -5 [ 1090.915329][T21250] loop2: detected capacity change from 0 to 178 [ 1090.943493][T21250] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1090.943493][T21250] 12:02:25 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xf0}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42e5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xffffffffffffff7f, &(0x7f0000061000)) [ 1090.972020][T21257] Mount JFS Failure: -22 [ 1090.979241][T21257] jfs_mount failed w/return code = -22 [ 1091.003545][T21250] ERROR: (device loop2): remounting filesystem as read-only [ 1091.015821][T21250] xtLookup: xtSearch returned -5 12:02:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000061000)) [ 1091.021645][T21250] read_mapping_page failed! [ 1091.027639][T21250] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1091.051276][T21250] Mount JFS Failure: -5 [ 1091.056205][T21250] jfs_mount failed w/return code = -5 12:02:25 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xa302}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0dc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:25 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x11a}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1091.137052][T21278] loop3: detected capacity change from 0 to 128 [ 1091.166151][T21283] loop4: detected capacity change from 0 to 178 [ 1091.238316][T21295] Mount JFS Failure: -22 [ 1091.244823][T21283] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1091.244823][T21283] 12:02:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xfffffffffffffffe, &(0x7f0000061000)) [ 1091.284096][T21295] jfs_mount failed w/return code = -22 [ 1091.290121][T21302] loop2: detected capacity change from 0 to 178 [ 1091.311364][T21302] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1091.311364][T21302] [ 1091.323719][T21302] ERROR: (device loop2): remounting filesystem as read-only [ 1091.331624][T21283] ERROR: (device loop4): remounting filesystem as read-only [ 1091.332505][T21302] xtLookup: xtSearch returned -5 [ 1091.346644][T21302] read_mapping_page failed! [ 1091.351213][T21302] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1091.360574][T21302] Mount JFS Failure: -5 [ 1091.364948][T21302] jfs_mount failed w/return code = -5 [ 1091.371366][T21283] xtLookup: xtSearch returned -5 [ 1091.376419][T21283] read_mapping_page failed! 12:02:25 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xa502}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x0, &(0x7f0000061000)) 12:02:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="0ec4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1091.380973][T21283] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1091.387442][T21283] Mount JFS Failure: -5 [ 1091.391611][T21283] jfs_mount failed w/return code = -5 12:02:25 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x150}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1091.453171][T21320] loop3: detected capacity change from 0 to 128 12:02:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42f5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1091.535658][T21332] Mount JFS Failure: -22 [ 1091.554042][T21332] jfs_mount failed w/return code = -22 12:02:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0xffffffffffffffff, &(0x7f0000061000)) [ 1091.598549][T21351] loop2: detected capacity change from 0 to 178 [ 1091.618859][T21351] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1091.618859][T21351] [ 1091.636791][T21351] ERROR: (device loop2): remounting filesystem as read-only 12:02:25 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}], 0x0, &(0x7f0000061000)) [ 1091.668542][T21351] xtLookup: xtSearch returned -5 [ 1091.677481][T21358] loop3: detected capacity change from 0 to 128 12:02:25 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x182}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1091.709002][T21356] loop4: detected capacity change from 0 to 178 [ 1091.735529][T21351] read_mapping_page failed! 12:02:25 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xb403}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1091.761118][T21356] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1091.761118][T21356] [ 1091.773434][T21356] ERROR: (device loop4): remounting filesystem as read-only [ 1091.784213][T21351] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1091.790514][T21351] Mount JFS Failure: -5 [ 1091.795379][T21351] jfs_mount failed w/return code = -5 12:02:25 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="11c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1091.836291][T21371] loop1: detected capacity change from 0 to 128 [ 1091.845867][T21356] xtLookup: xtSearch returned -5 [ 1091.851913][T21356] read_mapping_page failed! [ 1091.857571][T21356] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1091.864824][T21356] Mount JFS Failure: -5 [ 1091.869937][T21356] jfs_mount failed w/return code = -5 [ 1091.876881][T21371] Mount JFS Failure: -22 12:02:25 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)) [ 1091.918764][T21371] jfs_mount failed w/return code = -22 12:02:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1be}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xbe01}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4305f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x218}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1092.124786][T21397] loop3: detected capacity change from 0 to 128 [ 1092.146761][T21397] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1092.154927][T21397] Mount JFS Failure: -5 [ 1092.156127][T21400] loop2: detected capacity change from 0 to 178 [ 1092.160394][T21397] jfs_mount failed w/return code = -5 [ 1092.211137][T21414] loop1: detected capacity change from 0 to 128 [ 1092.228179][T21400] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1092.228179][T21400] [ 1092.239806][T21400] ERROR: (device loop2): remounting filesystem as read-only [ 1092.250240][T21400] xtLookup: xtSearch returned -5 [ 1092.260220][T21400] read_mapping_page failed! [ 1092.265746][T21400] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1092.272815][T21400] Mount JFS Failure: -5 [ 1092.277483][T21400] jfs_mount failed w/return code = -5 [ 1092.285658][T21423] loop4: detected capacity change from 0 to 178 [ 1092.291638][T21414] Mount JFS Failure: -22 [ 1092.298446][T21414] jfs_mount failed w/return code = -22 [ 1092.314701][T21423] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1092.314701][T21423] [ 1092.330967][T21423] ERROR: (device loop4): remounting filesystem as read-only [ 1092.341807][T21423] xtLookup: xtSearch returned -5 [ 1092.353600][T21423] read_mapping_page failed! 12:02:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x2}) 12:02:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xc103}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1092.383155][T21423] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1092.391763][T21423] Mount JFS Failure: -5 [ 1092.396307][T21423] jfs_mount failed w/return code = -5 12:02:26 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4585f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="12c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x26a}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xd603}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1092.586837][T21451] loop3: detected capacity change from 0 to 128 [ 1092.614069][T21453] loop1: detected capacity change from 0 to 128 [ 1092.643369][T21451] jfs: Unrecognized mount option "ø%ÿ" or missing value [ 1092.677979][T21453] Mount JFS Failure: -22 [ 1092.682359][T21453] jfs_mount failed w/return code = -22 12:02:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x291}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1092.691544][T21465] loop4: detected capacity change from 0 to 178 [ 1092.702481][T21465] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1092.702481][T21465] [ 1092.709681][T21467] loop2: detected capacity change from 0 to 178 [ 1092.719676][T21465] ERROR: (device loop4): remounting filesystem as read-only [ 1092.736661][T21465] xtLookup: xtSearch returned -5 [ 1092.782041][T21465] read_mapping_page failed! [ 1092.787247][T21467] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1092.787247][T21467] [ 1092.787636][T21467] ERROR: (device loop2): remounting filesystem as read-only [ 1092.807953][T21467] xtLookup: xtSearch returned -5 [ 1092.813242][T21467] read_mapping_page failed! [ 1092.818318][T21467] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1092.825693][T21467] Mount JFS Failure: -5 12:02:26 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x2a3}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:26 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:26 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x3}) 12:02:26 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xd902}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1092.830134][T21467] jfs_mount failed w/return code = -5 [ 1092.838904][T21465] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1092.854192][T21465] Mount JFS Failure: -5 [ 1092.870740][T21465] jfs_mount failed w/return code = -5 12:02:26 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="2fc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c45c5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1092.983263][T21503] loop3: detected capacity change from 0 to 128 [ 1092.999106][T21503] jfs: Unrecognized mount option "ø%ÿ" or missing value 12:02:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xdd03}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1093.052950][T21517] loop1: detected capacity change from 0 to 128 [ 1093.077328][T21519] loop4: detected capacity change from 0 to 178 12:02:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x2a5}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1093.103476][T21519] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1093.103476][T21519] [ 1093.120030][T21517] Mount JFS Failure: -22 [ 1093.144021][T21517] jfs_mount failed w/return code = -22 [ 1093.150720][T21519] ERROR: (device loop4): remounting filesystem as read-only [ 1093.169140][T21527] loop2: detected capacity change from 0 to 178 [ 1093.169686][T21519] xtLookup: xtSearch returned -5 [ 1093.181570][T21519] read_mapping_page failed! [ 1093.188473][T21519] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1093.195586][T21519] Mount JFS Failure: -5 12:02:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x4}) [ 1093.199788][T21519] jfs_mount failed w/return code = -5 [ 1093.211910][T21527] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1093.211910][T21527] [ 1093.222261][T21527] ERROR: (device loop2): remounting filesystem as read-only [ 1093.229691][T21527] xtLookup: xtSearch returned -5 [ 1093.234765][T21527] read_mapping_page failed! [ 1093.240527][T21527] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1093.247464][T21527] Mount JFS Failure: -5 12:02:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xe100}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1093.251616][T21527] jfs_mount failed w/return code = -5 12:02:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x2d9}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:27 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="31c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1093.322404][T21549] loop3: detected capacity change from 0 to 128 [ 1093.349005][T21549] jfs: Unrecognized mount option "ø%ÿ" or missing value 12:02:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4635f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xf000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x2f4}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x5}) 12:02:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x300}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1093.589802][T21582] loop4: detected capacity change from 0 to 178 [ 1093.589808][T21581] loop1: detected capacity change from 0 to 128 [ 1093.611972][T21582] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1093.611972][T21582] [ 1093.623221][T21581] Mount JFS Failure: -22 [ 1093.629004][T21581] jfs_mount failed w/return code = -22 [ 1093.643600][T21582] ERROR: (device loop4): remounting filesystem as read-only [ 1093.672850][T21596] loop3: detected capacity change from 0 to 128 [ 1093.681376][T21588] loop2: detected capacity change from 0 to 178 12:02:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xf402}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1093.701945][T21582] xtLookup: xtSearch returned -5 [ 1093.702593][T21596] jfs: Unrecognized mount option "ø%ÿ" or missing value [ 1093.726160][T21582] read_mapping_page failed! [ 1093.735638][T21588] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1093.735638][T21588] 12:02:27 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:27 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x319}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1093.750392][T21582] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1093.764130][T21588] ERROR: (device loop2): remounting filesystem as read-only [ 1093.773124][T21588] xtLookup: xtSearch returned -5 [ 1093.781517][T21588] read_mapping_page failed! [ 1093.797308][T21582] Mount JFS Failure: -5 12:02:27 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xfa03}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:27 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x6}) [ 1093.799478][T21588] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1093.801662][T21582] jfs_mount failed w/return code = -5 [ 1093.826963][T21588] Mount JFS Failure: -5 [ 1093.831500][T21588] jfs_mount failed w/return code = -5 12:02:27 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4695f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="36c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:28 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x31e}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1093.965492][T21632] loop1: detected capacity change from 0 to 128 [ 1093.994712][T21632] Mount JFS Failure: -22 [ 1094.027233][T21632] jfs_mount failed w/return code = -22 [ 1094.035011][T21645] loop4: detected capacity change from 0 to 178 [ 1094.044346][T21651] loop2: detected capacity change from 0 to 178 [ 1094.045955][T21645] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.045955][T21645] [ 1094.061180][T21645] ERROR: (device loop4): remounting filesystem as read-only [ 1094.068819][T21641] loop3: detected capacity change from 0 to 128 12:02:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600", 0xb, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:28 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x20000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1094.095856][T21645] xtLookup: xtSearch returned -5 [ 1094.101637][T21645] read_mapping_page failed! [ 1094.106706][T21645] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1094.113295][T21645] Mount JFS Failure: -5 [ 1094.118055][T21645] jfs_mount failed w/return code = -5 [ 1094.145856][T21651] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.145856][T21651] [ 1094.147267][T21641] jfs: Unrecognized mount option "ø%ÿ" or missing value [ 1094.158409][T21651] ERROR: (device loop2): remounting filesystem as read-only [ 1094.172659][T21651] xtLookup: xtSearch returned -5 [ 1094.177945][T21651] read_mapping_page failed! [ 1094.182575][T21651] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1094.189835][T21651] Mount JFS Failure: -5 [ 1094.194154][T21651] jfs_mount failed w/return code = -5 12:02:28 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x34d}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46c5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x7}) [ 1094.289146][T21674] loop1: detected capacity change from 0 to 128 [ 1094.313212][T21674] Currently only 4K block size supported! [ 1094.321065][T21674] Mount JFS Failure: -22 [ 1094.326640][T21674] jfs_mount failed w/return code = -22 12:02:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="37c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:28 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x40000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1094.428459][T21686] loop4: detected capacity change from 0 to 178 12:02:28 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600", 0xb, 0x8000}], 0x0, &(0x7f0000061000)) [ 1094.469999][T21686] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.469999][T21686] [ 1094.481711][T21686] ERROR: (device loop4): remounting filesystem as read-only [ 1094.489563][T21686] xtLookup: xtSearch returned -5 [ 1094.495128][T21686] read_mapping_page failed! [ 1094.500077][T21686] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1094.506611][T21686] Mount JFS Failure: -5 [ 1094.511021][T21686] jfs_mount failed w/return code = -5 12:02:28 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x352}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1094.518744][T21701] loop3: detected capacity change from 0 to 128 [ 1094.554960][T21709] loop2: detected capacity change from 0 to 178 [ 1094.585050][T21701] jfs: Unrecognized mount option "ø%ÿ" or missing value [ 1094.599925][T21709] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.599925][T21709] [ 1094.611851][T21709] ERROR: (device loop2): remounting filesystem as read-only [ 1094.620353][T21709] xtLookup: xtSearch returned -5 [ 1094.626184][T21709] read_mapping_page failed! [ 1094.631189][T21709] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:28 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46f5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:28 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1094.658377][T21709] Mount JFS Failure: -5 [ 1094.677269][T21709] jfs_mount failed w/return code = -5 [ 1094.692991][T21729] loop1: detected capacity change from 0 to 128 12:02:28 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x3b4}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1094.779473][T21737] loop4: detected capacity change from 0 to 178 12:02:28 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x8}) [ 1094.821799][T21737] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.821799][T21737] [ 1094.848552][T21729] Currently only 4K block size supported! [ 1094.855024][T21729] Mount JFS Failure: -22 [ 1094.859568][T21729] jfs_mount failed w/return code = -22 12:02:28 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="38c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:29 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x3c1}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600", 0xb, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:29 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x2000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1094.980763][T21737] ERROR: (device loop4): remounting filesystem as read-only [ 1095.009902][T21757] loop3: detected capacity change from 0 to 128 [ 1095.013992][T21737] xtLookup: xtSearch returned -5 [ 1095.021323][T21737] read_mapping_page failed! [ 1095.048234][T21757] jfs: Unrecognized mount option "ø%ÿ" or missing value [ 1095.054892][T21737] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1095.065358][T21737] Mount JFS Failure: -5 12:02:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x9}) 12:02:29 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x3d6}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1095.098409][T21737] jfs_mount failed w/return code = -5 [ 1095.125485][T21770] loop2: detected capacity change from 0 to 178 [ 1095.173350][T21770] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.173350][T21770] [ 1095.184831][T21770] ERROR: (device loop2): remounting filesystem as read-only [ 1095.191140][T21780] loop1: detected capacity change from 0 to 128 [ 1095.193157][T21770] xtLookup: xtSearch returned -5 [ 1095.203805][T21770] read_mapping_page failed! 12:02:29 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x3000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1095.222979][T21770] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1095.235894][T21770] Mount JFS Failure: -5 [ 1095.240234][T21770] jfs_mount failed w/return code = -5 [ 1095.263328][T21795] loop3: detected capacity change from 0 to 128 12:02:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4705f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:29 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x3dd}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1095.270621][T21780] Currently only 4K block size supported! [ 1095.277320][T21795] jfs: Unrecognized mount option " ø%ÿ" or missing value [ 1095.295759][T21780] Mount JFS Failure: -22 [ 1095.311382][T21780] jfs_mount failed w/return code = -22 12:02:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="3cc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0xa}) [ 1095.371385][T21807] loop4: detected capacity change from 0 to 178 [ 1095.409938][T21807] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.409938][T21807] 12:02:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000", 0x10, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:29 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x3fa}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1095.463494][T21807] ERROR: (device loop4): remounting filesystem as read-only [ 1095.472644][T21807] xtLookup: xtSearch returned -5 [ 1095.478340][T21807] read_mapping_page failed! [ 1095.483031][T21823] loop3: detected capacity change from 0 to 128 [ 1095.491320][T21807] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1095.502923][T21823] jfs: Unrecognized mount option " [ 1095.502923][T21823] ø%ÿ" or missing value 12:02:29 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x7000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1095.516961][T21807] Mount JFS Failure: -5 [ 1095.548929][T21807] jfs_mount failed w/return code = -5 [ 1095.567459][T21830] loop2: detected capacity change from 0 to 178 12:02:29 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0xb}) 12:02:29 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4735f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1095.710218][T21830] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.710218][T21830] [ 1095.723612][T21853] loop1: detected capacity change from 0 to 128 [ 1095.738253][T21853] Currently only 4K block size supported! [ 1095.753545][T21853] Mount JFS Failure: -22 12:02:29 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xe000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:29 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x700}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1095.763887][T21853] jfs_mount failed w/return code = -22 [ 1095.770566][T21830] ERROR: (device loop2): remounting filesystem as read-only [ 1095.778202][T21830] xtLookup: xtSearch returned -5 [ 1095.783336][T21830] read_mapping_page failed! [ 1095.788799][T21830] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1095.795350][T21830] Mount JFS Failure: -5 [ 1095.799743][T21830] jfs_mount failed w/return code = -5 12:02:29 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000", 0x10, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:29 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="49c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1095.901184][T21864] loop3: detected capacity change from 0 to 128 [ 1095.918156][T21864] jfs: Unrecognized mount option " ø%ÿ" or missing value [ 1095.937903][T21870] loop4: detected capacity change from 0 to 178 [ 1095.954428][T21875] loop1: detected capacity change from 0 to 128 [ 1095.967060][T21870] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.967060][T21870] [ 1095.980431][T21870] ERROR: (device loop4): remounting filesystem as read-only [ 1095.988867][T21870] xtLookup: xtSearch returned -5 [ 1095.994794][T21870] read_mapping_page failed! 12:02:30 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xe00}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1096.000388][T21870] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1096.007698][T21870] Mount JFS Failure: -5 [ 1096.012715][T21870] jfs_mount failed w/return code = -5 [ 1096.048384][T21875] Currently only 4K block size supported! [ 1096.057680][T21892] loop2: detected capacity change from 0 to 178 [ 1096.074243][T21892] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1096.074243][T21892] [ 1096.087672][T21892] ERROR: (device loop2): remounting filesystem as read-only 12:02:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0xc}) 12:02:30 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x18020000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1096.095847][T21892] xtLookup: xtSearch returned -5 [ 1096.101536][T21892] read_mapping_page failed! [ 1096.107802][T21892] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1096.114930][T21892] Mount JFS Failure: -5 [ 1096.119886][T21892] jfs_mount failed w/return code = -5 [ 1096.129720][T21875] Mount JFS Failure: -22 12:02:30 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4755f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1096.144157][T21875] jfs_mount failed w/return code = -22 12:02:30 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x19030000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="51c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:30 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1802}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:30 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000", 0x10, 0x8000}], 0x0, &(0x7f0000061000)) [ 1096.331357][T21914] loop3: detected capacity change from 0 to 128 [ 1096.361528][T21920] loop2: detected capacity change from 0 to 178 [ 1096.363171][T21914] jfs: Unrecognized mount option " ø%ÿ" or missing value 12:02:30 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1a010000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1096.381878][T21920] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1096.381878][T21920] [ 1096.456981][T21926] loop4: detected capacity change from 0 to 178 12:02:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0xd}) [ 1096.497987][T21920] ERROR: (device loop2): remounting filesystem as read-only [ 1096.542326][T21920] xtLookup: xtSearch returned -5 [ 1096.548376][T21920] read_mapping_page failed! [ 1096.553387][T21920] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1096.563221][T21920] Mount JFS Failure: -5 [ 1096.568685][T21920] jfs_mount failed w/return code = -5 [ 1096.574896][T21940] loop3: detected capacity change from 0 to 128 [ 1096.594184][T21940] jfs: Unrecognized mount option "ø%ÿ" or missing value [ 1096.594600][T21926] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1096.594600][T21926] [ 1096.612833][T21926] ERROR: (device loop4): remounting filesystem as read-only [ 1096.621068][T21944] loop1: detected capacity change from 0 to 128 [ 1096.671651][T21926] xtLookup: xtSearch returned -5 12:02:30 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0xf}) [ 1096.718904][T21926] read_mapping_page failed! [ 1096.732712][T21944] Currently only 4K block size supported! 12:02:30 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1903}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1096.791636][T21926] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1096.799847][T21944] Mount JFS Failure: -22 [ 1096.830932][T21926] Mount JFS Failure: -5 12:02:30 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="5dc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:30 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1e030000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1096.850880][T21926] jfs_mount failed w/return code = -5 [ 1096.856349][T21944] jfs_mount failed w/return code = -22 [ 1096.870498][T21963] loop3: detected capacity change from 0 to 128 [ 1096.918446][T21970] loop2: detected capacity change from 0 to 178 [ 1096.929966][T21970] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1096.929966][T21970] [ 1096.945581][T21963] jfs: Unrecognized mount option "ø%ÿ" or missing value [ 1096.946811][T21970] ERROR: (device loop2): remounting filesystem as read-only 12:02:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000", 0x13, 0x8000}], 0x0, &(0x7f0000061000)) [ 1096.993102][T21970] xtLookup: xtSearch returned -5 [ 1097.000744][T21970] read_mapping_page failed! [ 1097.009290][T21970] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1097.016121][T21970] Mount JFS Failure: -5 [ 1097.020479][T21970] jfs_mount failed w/return code = -5 12:02:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4785f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x10}) 12:02:31 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x45000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:31 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1a01}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="6fc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1097.166283][T21996] loop3: detected capacity change from 0 to 128 [ 1097.191082][T21996] jfs: Unrecognized mount option "ø%ÿ" or missing value 12:02:31 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1e03}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1097.215772][T22003] loop1: detected capacity change from 0 to 128 [ 1097.240525][T22003] jfs_mount: Mount Failure: superblock is corrupt! [ 1097.248656][T22003] Mount JFS Failure: -22 [ 1097.253546][T22003] jfs_mount failed w/return code = -22 [ 1097.260159][T22010] loop2: detected capacity change from 0 to 178 [ 1097.273396][T22010] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.273396][T22010] [ 1097.284659][T22010] ERROR: (device loop2): remounting filesystem as read-only [ 1097.297173][T22010] xtLookup: xtSearch returned -5 [ 1097.302343][T22010] read_mapping_page failed! [ 1097.307866][T22010] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1097.314666][T22010] Mount JFS Failure: -5 12:02:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x11}) 12:02:31 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x46000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000", 0x13, 0x8000}], 0x0, &(0x7f0000061000)) [ 1097.317813][T22013] loop4: detected capacity change from 0 to 178 [ 1097.319006][T22010] jfs_mount failed w/return code = -5 [ 1097.385437][T22025] loop3: detected capacity change from 0 to 128 [ 1097.396561][T22013] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.396561][T22013] [ 1097.412466][T22025] jfs: Unrecognized mount option "ø%ÿ" or missing value [ 1097.420505][T22013] ERROR: (device loop4): remounting filesystem as read-only [ 1097.428423][T22013] xtLookup: xtSearch returned -5 [ 1097.449152][T22013] read_mapping_page failed! 12:02:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c40a5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1097.494557][T22013] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:31 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x4500}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:31 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x4d030000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1097.568815][T22013] Mount JFS Failure: -5 [ 1097.618722][T22013] jfs_mount failed w/return code = -5 [ 1097.646202][T22046] loop1: detected capacity change from 0 to 128 [ 1097.668318][T22046] jfs_mount: Mount Failure: superblock is corrupt! [ 1097.694344][T22046] Mount JFS Failure: -22 [ 1097.700466][T22046] jfs_mount failed w/return code = -22 [ 1097.727690][T22053] loop2: detected capacity change from 0 to 178 [ 1097.763594][T22053] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.763594][T22053] 12:02:31 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4640a010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:31 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x23}) 12:02:31 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x4600}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:31 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x50010000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1097.775230][T22053] ERROR: (device loop2): remounting filesystem as read-only [ 1097.782544][T22053] xtLookup: xtSearch returned -5 [ 1097.791262][T22053] read_mapping_page failed! [ 1097.796930][T22053] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1097.803284][T22053] Mount JFS Failure: -5 [ 1097.809384][T22053] jfs_mount failed w/return code = -5 12:02:31 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4235f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1097.876327][T22073] loop4: detected capacity change from 0 to 178 12:02:31 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000", 0x13, 0x8000}], 0x0, &(0x7f0000061000)) [ 1097.920315][T22073] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.920315][T22073] [ 1097.935292][T22073] ERROR: (device loop4): remounting filesystem as read-only [ 1097.942979][T22073] xtLookup: xtSearch returned -5 [ 1097.951902][T22073] read_mapping_page failed! [ 1097.964074][T22073] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1097.964223][T22079] loop3: detected capacity change from 0 to 128 [ 1097.972148][T22073] Mount JFS Failure: -5 [ 1097.984822][T22073] jfs_mount failed w/return code = -5 12:02:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x52030000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:32 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x4d03}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1098.031694][T22079] jfs: Unrecognized mount option "#ø%ÿ" or missing value 12:02:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x48}) [ 1098.096636][T22095] loop1: detected capacity change from 0 to 128 [ 1098.110283][T22100] loop2: detected capacity change from 0 to 178 [ 1098.127628][T22095] jfs_mount: Mount Failure: superblock is corrupt! 12:02:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46425010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1098.161969][T22095] Mount JFS Failure: -22 [ 1098.184309][T22100] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.184309][T22100] [ 1098.188526][T22095] jfs_mount failed w/return code = -22 [ 1098.231586][T22100] ERROR: (device loop2): remounting filesystem as read-only [ 1098.249320][T22100] xtLookup: xtSearch returned -5 [ 1098.270359][T22100] read_mapping_page failed! 12:02:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000", 0x14, 0x8000}], 0x0, &(0x7f0000061000)) [ 1098.306115][T22100] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1098.344341][T22112] loop4: detected capacity change from 0 to 178 [ 1098.361178][T22100] Mount JFS Failure: -5 [ 1098.375205][T22112] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.375205][T22112] [ 1098.380623][T22100] jfs_mount failed w/return code = -5 [ 1098.399644][T22119] loop3: detected capacity change from 0 to 128 12:02:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x5c000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1098.446335][T22112] ERROR: (device loop4): remounting filesystem as read-only [ 1098.471670][T22119] jfs: Unrecognized mount option "Hø%ÿ" or missing value [ 1098.489914][T22112] xtLookup: xtSearch returned -5 12:02:32 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x5001}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1098.505219][T22129] loop1: detected capacity change from 0 to 128 [ 1098.518802][T22129] jfs_mount: Mount Failure: superblock is corrupt! [ 1098.526642][T22129] Mount JFS Failure: -22 [ 1098.531045][T22129] jfs_mount failed w/return code = -22 [ 1098.539963][T22112] read_mapping_page failed! [ 1098.545173][T22112] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1098.551547][T22112] Mount JFS Failure: -5 12:02:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4255f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1098.556843][T22112] jfs_mount failed w/return code = -5 12:02:32 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000", 0x14, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:32 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4646f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:32 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x6a020000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:32 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x4c}) [ 1098.690268][T22151] loop2: detected capacity change from 0 to 178 [ 1098.709863][T22151] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.709863][T22151] [ 1098.721800][T22151] ERROR: (device loop2): remounting filesystem as read-only [ 1098.730789][T22151] xtLookup: xtSearch returned -5 12:02:32 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x5203}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1098.736959][T22151] read_mapping_page failed! [ 1098.742174][T22151] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1098.749456][T22151] Mount JFS Failure: -5 [ 1098.755771][T22151] jfs_mount failed w/return code = -5 [ 1098.805955][T22155] loop4: detected capacity change from 0 to 178 12:02:32 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42a5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1098.877683][T22170] loop3: detected capacity change from 0 to 128 [ 1098.896328][T22155] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.896328][T22155] [ 1098.909545][T22155] ERROR: (device loop4): remounting filesystem as read-only [ 1098.917955][T22170] jfs: Unrecognized mount option "Lø%ÿ" or missing value 12:02:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x7b000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1098.938444][T22155] xtLookup: xtSearch returned -5 [ 1098.964983][T22180] loop1: detected capacity change from 0 to 128 [ 1099.000081][T22155] read_mapping_page failed! [ 1099.010642][T22195] loop2: detected capacity change from 0 to 178 [ 1099.028415][T22180] jfs_mount: Mount Failure: superblock is corrupt! [ 1099.034963][T22195] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.034963][T22195] 12:02:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x60}) 12:02:33 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x5c00}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1099.046411][T22195] ERROR: (device loop2): remounting filesystem as read-only [ 1099.057194][T22195] xtLookup: xtSearch returned -5 [ 1099.062333][T22195] read_mapping_page failed! [ 1099.069675][T22195] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1099.071287][T22155] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1099.076106][T22195] Mount JFS Failure: -5 [ 1099.076120][T22195] jfs_mount failed w/return code = -5 [ 1099.101625][T22180] Mount JFS Failure: -22 [ 1099.108063][T22180] jfs_mount failed w/return code = -22 [ 1099.115361][T22155] Mount JFS Failure: -5 [ 1099.119568][T22155] jfs_mount failed w/return code = -5 12:02:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x82010000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f020000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000", 0x14, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42b5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1099.251597][T22213] loop3: detected capacity change from 0 to 128 12:02:33 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x6a02}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x91020000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1099.407895][T22213] jfs: Unrecognized mount option "`ø%ÿ" or missing value [ 1099.466338][T22231] loop2: detected capacity change from 0 to 178 [ 1099.495935][T22232] loop4: detected capacity change from 0 to 178 [ 1099.502098][T22231] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.502098][T22231] [ 1099.516086][T22235] loop1: detected capacity change from 0 to 128 [ 1099.552146][T22235] jfs_mount: Mount Failure: superblock is corrupt! [ 1099.561156][T22231] ERROR: (device loop2): remounting filesystem as read-only [ 1099.574903][T22231] xtLookup: xtSearch returned -5 [ 1099.580259][T22231] read_mapping_page failed! [ 1099.585324][T22231] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1099.589792][T22232] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.589792][T22232] [ 1099.591967][T22231] Mount JFS Failure: -5 [ 1099.606225][T22231] jfs_mount failed w/return code = -5 [ 1099.612354][T22235] Mount JFS Failure: -22 [ 1099.617325][T22235] jfs_mount failed w/return code = -22 12:02:33 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xa3020000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:33 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15}], 0x0, &(0x7f0000061000)) 12:02:33 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42d5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:33 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x7b00}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:33 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x68}) [ 1099.740464][T22232] ERROR: (device loop4): remounting filesystem as read-only [ 1099.757573][T22232] xtLookup: xtSearch returned -5 [ 1099.800874][T22232] read_mapping_page failed! [ 1099.826865][T22232] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1099.859431][T22232] Mount JFS Failure: -5 [ 1099.877711][T22272] loop2: detected capacity change from 0 to 178 [ 1099.903654][T22232] jfs_mount failed w/return code = -5 [ 1099.909836][T22272] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.909836][T22272] 12:02:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xa5020000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1099.928408][T22281] Mount JFS Failure: -22 [ 1099.928650][T22282] loop3: detected capacity change from 0 to 128 [ 1099.954288][T22272] ERROR: (device loop2): remounting filesystem as read-only [ 1099.971540][T22282] jfs: Unrecognized mount option "hø%ÿ" or missing value [ 1099.984099][T22281] jfs_mount failed w/return code = -22 [ 1099.990145][T22272] xtLookup: xtSearch returned -5 [ 1100.003919][T22272] read_mapping_page failed! [ 1100.010283][T22272] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1100.018167][T22272] Mount JFS Failure: -5 [ 1100.022521][T22272] jfs_mount failed w/return code = -5 12:02:34 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x8201}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f030000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x6c}) 12:02:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15}], 0x0, &(0x7f0000061000)) 12:02:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42e5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xb4030000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:34 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x9102}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1100.259124][T22318] loop3: detected capacity change from 0 to 128 [ 1100.297816][T22324] loop2: detected capacity change from 0 to 178 12:02:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xbe010000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1100.379660][T22324] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.379660][T22324] [ 1100.396930][T22327] loop4: detected capacity change from 0 to 178 [ 1100.412197][T22332] Mount JFS Failure: -22 [ 1100.451854][T22318] jfs: Unrecognized mount option "lø%ÿ" or missing value [ 1100.453169][T22332] jfs_mount failed w/return code = -22 [ 1100.473620][T22327] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.473620][T22327] [ 1100.487025][T22327] ERROR: (device loop4): remounting filesystem as read-only [ 1100.494643][T22327] xtLookup: xtSearch returned -5 12:02:34 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xa302}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1100.509707][T22327] read_mapping_page failed! [ 1100.515011][T22327] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1100.521268][T22327] Mount JFS Failure: -5 [ 1100.525518][T22327] jfs_mount failed w/return code = -5 [ 1100.533496][T22324] ERROR: (device loop2): remounting filesystem as read-only [ 1100.541229][T22324] xtLookup: xtSearch returned -5 [ 1100.549140][T22324] read_mapping_page failed! [ 1100.554005][T22324] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:34 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15}], 0x0, &(0x7f0000061000)) [ 1100.560370][T22324] Mount JFS Failure: -5 [ 1100.564999][T22324] jfs_mount failed w/return code = -5 12:02:34 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f040000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:34 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x74}) 12:02:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xc1030000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:34 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42f5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:34 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xa502}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1100.780108][T22374] loop4: detected capacity change from 0 to 178 [ 1100.845093][T22378] Mount JFS Failure: -22 [ 1100.890012][T22390] loop3: detected capacity change from 0 to 128 [ 1100.900653][T22378] jfs_mount failed w/return code = -22 [ 1100.912282][T22390] jfs: Unrecognized mount option "tø%ÿ" or missing value [ 1100.916318][T22374] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.916318][T22374] 12:02:34 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xd6030000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1100.947585][T22396] loop2: detected capacity change from 0 to 178 [ 1100.999034][T22396] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.999034][T22396] 12:02:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, 0x0) 12:02:35 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xb403}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1101.041680][T22374] ERROR: (device loop4): remounting filesystem as read-only 12:02:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x7a}) 12:02:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xd9020000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1101.099420][T22374] xtLookup: xtSearch returned -5 [ 1101.107468][T22396] ERROR: (device loop2): remounting filesystem as read-only [ 1101.197521][T22374] read_mapping_page failed! [ 1101.208870][T22396] xtLookup: xtSearch returned -5 [ 1101.224920][T22396] read_mapping_page failed! [ 1101.229962][T22396] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1101.246395][T22416] loop3: detected capacity change from 0 to 128 [ 1101.263859][T22374] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1101.272990][T22374] Mount JFS Failure: -5 [ 1101.284001][T22396] Mount JFS Failure: -5 [ 1101.288285][T22396] jfs_mount failed w/return code = -5 [ 1101.305091][T22416] jfs: Unrecognized mount option "zø%ÿ" or missing value [ 1101.313326][T22374] jfs_mount failed w/return code = -5 12:02:35 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xbe01}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xdd030000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f050000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1101.369939][T22434] loop1: detected capacity change from 0 to 128 12:02:35 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4305f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:35 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0xfe}) 12:02:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, 0x0) [ 1101.616893][T22460] loop4: detected capacity change from 0 to 178 [ 1101.656850][T22468] loop3: detected capacity change from 0 to 128 12:02:35 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xe1000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1101.674228][T22467] loop2: detected capacity change from 0 to 178 [ 1101.704102][T22460] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1101.704102][T22460] 12:02:35 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xc103}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1101.728994][T22467] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1101.728994][T22467] [ 1101.745703][T22468] jfs: Unrecognized mount option "þø%ÿ" or missing value [ 1101.752877][T22478] loop1: detected capacity change from 0 to 128 [ 1101.755079][T22460] ERROR: (device loop4): remounting filesystem as read-only [ 1101.772499][T22467] ERROR: (device loop2): remounting filesystem as read-only [ 1101.781281][T22460] xtLookup: xtSearch returned -5 [ 1101.792972][T22467] xtLookup: xtSearch returned -5 [ 1101.846535][T22460] read_mapping_page failed! [ 1101.865370][T22467] read_mapping_page failed! 12:02:35 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, 0x0) [ 1101.898124][T22460] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1101.924218][T22467] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0xff}) [ 1101.962329][T22460] Mount JFS Failure: -5 [ 1101.978571][T22467] Mount JFS Failure: -5 12:02:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xf0000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1102.004335][T22460] jfs_mount failed w/return code = -5 [ 1102.011659][T22467] jfs_mount failed w/return code = -5 12:02:36 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xd603}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4585f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f070000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1102.160908][T22506] loop3: detected capacity change from 0 to 128 [ 1102.161104][T22508] loop1: detected capacity change from 0 to 128 [ 1102.189505][T22506] jfs: Unrecognized mount option "ÿø%ÿ" or missing value 12:02:36 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xd902}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xf4020000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x60}) 12:02:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="9bf4d91aeb6999a233f1ef70b0cdba7a9c8f68fb8976d264330a39bee524af45179ecd684a791d1fdb1d28086bd8c189a8bc45ef406be81bfdf2a2ffaa9bbb3f0700000000000000b9e3fe314c40115c8a2f88f6fd9782c1666e60abed6ce20b3f6525e91387bd00b959febfbc1b593222397be2f86983fa7e8dceb0693023b18ca7bc9ef618b62b41d6a30dc8ec0d9dea05e138f78b51acd25e12327ad7b1ff97fd"]) [ 1102.343166][T22529] loop2: detected capacity change from 0 to 178 [ 1102.351802][T22532] loop4: detected capacity change from 0 to 178 [ 1102.375237][T22529] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1102.375237][T22529] [ 1102.408609][T22544] loop1: detected capacity change from 0 to 128 [ 1102.420097][T22544] jfs: Unrecognized mount option "`ø%ÿ" or missing value [ 1102.430137][T22532] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1102.430137][T22532] [ 1102.431048][T22529] ERROR: (device loop2): remounting filesystem as read-only [ 1102.450424][T22529] xtLookup: xtSearch returned -5 [ 1102.455881][T22529] read_mapping_page failed! [ 1102.460430][T22529] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1102.467170][T22529] Mount JFS Failure: -5 [ 1102.471347][T22529] jfs_mount failed w/return code = -5 [ 1102.474623][T22553] loop3: detected capacity change from 0 to 128 [ 1102.477417][T22532] ERROR: (device loop4): remounting filesystem as read-only 12:02:36 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xdd03}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1102.504659][T22532] xtLookup: xtSearch returned -5 [ 1102.509606][T22532] read_mapping_page failed! 12:02:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xfa030000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:36 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x6a02}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1102.536834][T22553] jfs: Unrecognized mount option "›ôÙëi™¢3ñïp°Íºzœhû‰vÒd3 [ 1102.536834][T22553] 9¾å$¯EžÍhJyÛ(kØÁ‰¨¼Eï@kèýò¢ÿª›»?" or missing value [ 1102.561315][T22532] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1102.568159][T22532] Mount JFS Failure: -5 [ 1102.572571][T22532] jfs_mount failed w/return code = -5 12:02:36 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c45c5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:36 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f080000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:36 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0x2}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:36 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xe100}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:36 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00439e5e00ca24566bad6c5f328ec7f38ba2c09d19ee6b8a4105047487003c3a71fdc3a8e4a4e9247387fe1fb4a099c7c082dae9efaad11005000000000000002e6bec790c8d5f54b990f5a2d5283521848b00000000"]) [ 1102.741120][T22583] loop2: detected capacity change from 0 to 178 12:02:36 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)={[], [], 0x5}) [ 1102.797979][T22583] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1102.797979][T22583] [ 1102.808794][T22583] ERROR: (device loop2): remounting filesystem as read-only [ 1102.816291][T22583] xtLookup: xtSearch returned -5 [ 1102.821383][T22583] read_mapping_page failed! [ 1102.826110][T22583] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1102.832519][T22583] Mount JFS Failure: -5 [ 1102.837753][T22583] jfs_mount failed w/return code = -5 [ 1102.913616][T22602] loop3: detected capacity change from 0 to 128 [ 1102.931207][T22602] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1102.932963][T22591] loop4: detected capacity change from 0 to 178 [ 1102.942618][T22602] Mount JFS Failure: -5 [ 1102.949169][T22602] jfs_mount failed w/return code = -5 12:02:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4635f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xf000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0x3}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1102.972795][T22591] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1102.972795][T22591] [ 1103.013027][T22591] ERROR: (device loop4): remounting filesystem as read-only 12:02:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xf402}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)=ANY=[@ANYBLOB='\a']) [ 1103.081783][T22591] xtLookup: xtSearch returned -5 [ 1103.115374][T22591] read_mapping_page failed! 12:02:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0x4}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1103.155339][T22632] loop1: detected capacity change from 0 to 128 [ 1103.170995][T22591] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1103.199518][T22632] jfs: Unrecognized mount option "ø%ÿ" or missing value [ 1103.209439][T22591] Mount JFS Failure: -5 [ 1103.215235][T22591] jfs_mount failed w/return code = -5 [ 1103.216093][T22648] loop2: detected capacity change from 0 to 178 12:02:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xfa03}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1103.251270][T22648] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.251270][T22648] [ 1103.267745][T22648] ERROR: (device loop2): remounting filesystem as read-only [ 1103.277681][T22648] xtLookup: xtSearch returned -5 [ 1103.282900][T22648] read_mapping_page failed! [ 1103.287857][T22648] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1103.294374][T22648] Mount JFS Failure: -5 [ 1103.298757][T22648] jfs_mount failed w/return code = -5 12:02:37 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f090000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0x7}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:37 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4695f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1103.395701][T22669] loop3: detected capacity change from 0 to 128 [ 1103.430288][T22669] jfs: Unrecognized mount option "" or missing value 12:02:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x20000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0xe}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1103.578665][T22693] loop4: detected capacity change from 0 to 178 [ 1103.586259][T22691] loop3: detected capacity change from 0 to 128 [ 1103.594222][T22691] jfs: Unrecognized mount option "" or missing value 12:02:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = memfd_create(&(0x7f0000000040)='jfs\x00', 0x6) mmap(&(0x7f000044e000/0x3000)=nil, 0x3000, 0xe, 0x30, r1, 0xb802f000) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)) [ 1103.622365][T22701] loop1: detected capacity change from 0 to 128 [ 1103.653035][T22701] jfs_mount: Mount Failure: File System Dirty. [ 1103.685407][T22693] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.685407][T22693] [ 1103.722837][T22709] loop2: detected capacity change from 0 to 178 [ 1103.737819][T22701] Mount JFS Failure: -22 [ 1103.743327][T22701] jfs_mount failed w/return code = -22 [ 1103.751812][T22693] ERROR: (device loop4): remounting filesystem as read-only 12:02:37 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0x45}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:37 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x40000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1103.785029][T22693] xtLookup: xtSearch returned -5 [ 1103.791020][T22693] read_mapping_page failed! [ 1103.796532][T22693] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1103.803872][T22693] Mount JFS Failure: -5 [ 1103.806147][T22709] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.806147][T22709] [ 1103.808896][T22693] jfs_mount failed w/return code = -5 12:02:37 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1103.855162][T22709] ERROR: (device loop2): remounting filesystem as read-only [ 1103.864495][T22709] xtLookup: xtSearch returned -5 [ 1103.870880][T22709] read_mapping_page failed! [ 1103.879544][T22709] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1103.898735][T22709] Mount JFS Failure: -5 [ 1103.912659][T22709] jfs_mount failed w/return code = -5 12:02:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0x46}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1103.933364][T22733] loop3: detected capacity change from 0 to 128 [ 1103.948634][T22733] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1103.957878][T22733] Mount JFS Failure: -5 [ 1103.962904][T22733] jfs_mount failed w/return code = -5 12:02:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0a0000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_mount_image$adfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x8, 0x3, &(0x7f0000001340)=[{&(0x7f0000000240)="dea28f3dc558039f0c295be7141bab03c34f2878db5538f84f7564e5d09ab82495430aa02684f1f4e5e19a6384f51599e7cd63f825aa4f8f9d5b1166e45002c6bc49a97a7804beea588d45f1fb9a61bdc1c3aa3f0910d91c3df32ce8dcf28c1c98182a872558ae58dbc75a85b8934044b6f1903730130cb464253d2411990819422f24645b969dcd530b64ed42cc4cc954cf5f0e23c19744a62b20bb204d29ea0aad1193448ec51f2ae95fa908476bc8037cb944c4348c484ba2c73a99d0c3fe6543aeed8d4af405d21a6224a9147b3503310d648d08be1af82c5ad287c7520194522af8085588deb2b7b4605889898540e3ca9651654a2facd0c1400a153110376bcaffd4c188489b1b9b7cf59a2968208a90fb20d19869c4f53de2a414d40502820c43d10d777174326dce68ca1846f246ad3bc4d81198b184d7b21ab036eb3cf4964f06c2955570d6529db8902360d8efc4802b789cbcfb157c59450cabdaace66dba393f19a74e875338f68b362a7b99e24edd91061ab80e55227989bcd30acfe0fcc1485f83d9a62b429999994454b42df70d3f3b86f2c792630cf66de591145139f8126c685454fb7a39676a207c3818fe0d511c2574e379544cdd6fa1ea870783d927807f9961bda9d2f11c1c1ecf8f5ab29f46f75edb8519b963c6f8d70384c5ea666c801dbe069bb80792cbff21350b4d6c8d513a1457685a522b03b6e9b224319fdeb40b7dcff0d0188c050d573d9a574a2ba82048f24cc421649c90606854a29cfc5c791d60e65a89801fc422c9d723f47b3fe569a3db5afb69fc66eddcd31d7efce0c30d0d0a2a47e97069fcb7fb4e1ed5b9f354492b61b2500203682c89d82f17a8e656fd9074f1106e2ad55e480f7138691cb26c24d2afafcb6e853909d3ce85ebfc5271da178e22a4a06dc805a611d7fddeeb0c0f939b5f568efd2ea5fccb2a941437b88efd6eb32ea93b545b4ad12fa95b803dd76dc5840239a7bf3e56bba9f7edce6932e88d2226937abe3896e5dce5a5d686cf43db0b5f4c4334eaf04f6c9a02c2c9c7e6062d1bc83612a78682aa13ab3e7927e8e1f19c7811b47a9a128bb73a99bd5fb0c61b2e7f702d7758bee72a56d2b769c09316f249bb45cae44c4ffdc2826d9b60405767cd9ec4f65c61b7f488d3efe7aeac8b1472ef1bd12dacd22df79acafb65e380a9df30832d3867aea9b0854d18205c5720db33fb8cbdd76670d58fd03fc58a1a708c93634d5a7098dc9e2438a2a549f612f13618305687e3ac9b8980d5eeeaf5a2111bc1fde2e467366fd4058c8a4e795f9836bdcec73c6748d33089c4a0b6fb3845537e5a1d998725a99090fe9aa948601416f58e9b63797d31afb93362a3f0ff9b1cf59dcf5cd6620542f0e3bba5602cf573778081f568b58bd0191f69dc1f5f14793a412a2cd65f629426d6bd54ebbf301a700abaf3ebfe68a6b8b28e53016ed4910fc1cbb738009bb4ee0a3d206805b587f3069fd93e808c147c895addb035c1d815f7692b43add9489c27ff27392e6b5163af5dc9e1d4b28e6fa7ef40788a35a7fa693dbafd0c424e03254e90e737939255b5cc161bba2680751e30ac61647819ce53d7e87f87b9c7dc95602a26abd0f5e806e957cc11f9fe0a922b2568ba35bb0e3c24d1c7c9163f65dad058e75c8fedeede7cdec42b437dde30d374bfe25b50310bed9df65b9c1d5bea77f1b9ffa072dc578935426e7ba62005efaa177235735e0500d3cc95309ed38be2126f5e85d526c86c5548d3b4771d0871dd490199be791d9258f247a198e0acbbc833ae5d431e370c54c0ea961b222444708294fa8476badcea9c477fa57e267713563b1594cf667d75ae25ce05e6d7975f46fb8074bf8aec7bbee35712e4bf64653cfc78f5c30647d6c64570a30f832d2d4201647ef9ea3208dd8c122cb55788e0ddf19bea21957cc97238a600aeb3eb6abf67a7c00aae73b340728cdde936b1479faa20bde4b3a027e6420a26633dd5b792f44995ec4467a04c55e5e9e6b93fb63adaa9508d3be8f6ffbe63e03acabe5102c68c121a26452b8874b19195ff8c2a959a1657ddefe2530dcbeb6d5d21749161469304c037c72211e092b448c64ee6bc09a94ea3b58ce47f681fb073c276d8b4807946d308acd38bb8a7ba03a856eb3ce137568d4159f9a0c6772a5c8163b7017901db9d3cd09479697b2719bccd8dd097abf013111e5567cef638d9e1ca6812f1570a329fc353d7b467bfe8a17cf78c3c6ff7f5407f55304ab471324d9c84c55075b336ee321d3528da977accd718ec731cd488b4dd1d074533cbde44ab8a4fb182abaced4cb4c90dec950aecd3547075ee9ac7a987b134cc8608674413627d618336b44ddee4d5c08aa64d63640fe6fe46ad454a0e4975fee35490d5fab8417082a4bacbf5e603410d6605895ba5889559e1c7e73c61e5aef526afc6acee8f0db4e5abb4d762dac792c702bd4c9b3d323b7b0ba98e94340bdf9d4674ecb7a0f1c4b78ac88753ad96a8848b441a5d34446e67254fe771ffcf3586ead71c15ce983269627ade4f553de4d214d3721cb6a2ecde3227711202f4109c2c0967e500060a09f513e5ebeb976ccac4bcf339c698c77dd39ef40b278c2c85c7597fc5f825fae8158799729cd2e2941ded16cf33229394eb4342f308cc43fcbbbf3d5aade6f8928f659e7a6586ebb1f1565701c5644652112962fbd99813d36ca14c1a4ff0e9ae24b32446958cdf6bc8cca94f5ef556473cfb24a5294563992a7b90a7114a7c3f977752ecd5882b99ac19b6d7a9dd5aa4393694681faa41bc1af1f31a0c2f55638f3b9b7dd3728cde5d610e4b99afca98984bdbbea4e4eef604d875de9086c828c0734adbe919f4c656862a26924a4251f272bf87121176e34f49951c24c156898e6b7b6fe6b060cb857701b1b0e4ef0f5845cdec1b40aa41f48965d3624aa6ac16fa4983f395a959627aef23eea954aebf82f865540b48df8c3b94a8ba40df9a86807180c4ce462f2d1e45bba7307c87296f813a3813fc3f1580a4174935fd30d0bbd8bc5d83f35db9894c0ef158d70ba4aebb05485bbfc492bcbe6af31d6f78f2d47d39af4158fb75e999d856bee8dfefa408559049fd11b864516fa0d4a98d356f195acd04ddde6602937c1a2d1f05f375955932095409dd57a305892c88069186ea5e760b3f4ba8ee45638ffbca1c0d17edcf4a5a7bf42270c38bac1de57fe6772fb07e2f8b3b5969e75cdcd6340d72cfbcc0dacd6e859c513e6c9614effc1ce759c3c820787b6cabef1db17ea31e70cbcc601edbd71092316591bf65c99ac330a7a8b3ad07acff4025a2069ec5b156a58f7e8ed332f0cd4e329015b360de7647d5a5fbfc8fd324a799c9ec28a804e96df1714ffa5431064a341354d99adf0108bfd6771ce61113879c5bb93513305842cedbb16d201f66206e4d14fc62cc1f899aa79db425848086f58502ba9a4216e7e0a4c6dbc61f54f4ae92fe50a7fe678916a52773de1affce348591346894d1786321261100999da35c416312c0af6a91effae01dba46603559696ad07f9a30f481c3f789dfacedf408955479a9efd0315e825c29c543c0ccc022800364227b0a1c59f6e2c8b6b6e911f9a75816cb84c5bb914905661a9e5328e84af1b92933b150786d0adc926c60c6fc4d07e2335a0b48a0d2abb93471a07dfe408afd62e69fef4c8da1a40c85751fb529cec68524a0807998829a8876f875c4db5805525136cee8b771dfdf1db9c3bd8b43b2366f64dcd722b0c5daa808fce4f743e8f324cff4da16225dda9b795bffa560e22a2aa2c5c2705ac6829a56445df768ab224f17eeefb2e694b2bf152fafc6e15520c28867a4730d0bf43e99b055c27ad8d06ee8c34eb824b2f49ba4e67dba8f653950a934c0a41a6eba22eab14e9a3a1e645e269738559fe24d021f9f4c86d949726eae2e30044f84549586cd5e543d599994d986efcc593b7ea8123b61f62a9199929465ea5dd4c02eb84a662c26c75e0a40191eed9a9d0f44724258b215d2f84baf1d10c684ad568480b2c456f71824ef4a47db92fb4d9fdca5352b2a1c2609e3d9154f6d7b19ddfd756cd1fb8c5ddb3955e0615a46060837dab5640cd8ca55223aabf997082fec4c8a0dd7753c2e6222013cc5fbb2f9c0570c0e99bb49c1ddac23cb78a8881ece5d1bc01c619d6b1238cfb9205496a24a94d1cce65a115747226924bde9eb42b9b85959df1bd86ee53e8eb4fab79ec83e123f72ad042f5c59dad92dbf3b6b9f35c67c38ffa0b3cebfbd7c1f85e52ec43ad5da9137c64afc073dedf8cd35ec7b2463d3f7a5a107211c5f594f53f40ccb6fd9484418cbaffb3cc022aa7ead62ab743a4ddc97cd955fbe6311f5b58bfb5e6d5dd2158cc93fe676c89c3013fe0b55e36f79cbabc282946d293f31e0074f64594479894719d0a108f520a9ca37bcc1915fa86657ac2e804885eef56f464f43d094e786657854a32960fe1072aa5fad21a68a029eaefd92f488d48b2466a1e4c259ac5009247d1e61bc2e4add98a66c2e32f7890dda454723c34b1217064a2c2a53d23a76453064f137d95033b8d7312bc18c4691c1b216aa9958370d745acb21d7721d176a5f8aa555a36a8b1c6764a2e71a3b57a44718507eaacd08d55dc97ad03fd737a50195f8ea5f41e1f540f547d42b1fef2e2ff51e5655dbe7801b812ee47802a76b825c42dfe8c1f3c60117bfad73f99adb4687ccaaa8e5f937d1159f10de335a515cfa990e0c46b55aa56a189047836326045d4ad4ef3468699eeda2e58f1817329bcb06dcd76d61e557d4b8efca46e79b56293a9ccea7989691f7403972e4c74ed6bf1ada1953e0cc1a0f7288df4db28c3fb2ae6a7a1dfe0d476ef193e8e2b4b381f6dda3a5e451a814f869430b71a7013ca10eac0309dcd9e64548d46723b429014f2bfcd99b809220282aa0c0a33602a30c9e46183aaa79bfdf680576f052698c0839e54451ce15a44718ace449935399c1ada69269663e1628bcaff5b4f7a16625c4734a237691f42c2695915b39d41013cdc8a4809578978a8918a1127900867617887b12c4d3c2d53a873d571e7fda689bd193e378928e3f29fe2020fdc938a062a5d7672165d707db1b48ded40e1f1cb7152d922ce31fdf40f3217f49ad230c9b38cdbd6955e5c35076dd34ba1f54b82b602b2b626eb0c6ad0133e312969692e95d464d55fb4105328d1609b15dad94232bd0cfdfdc2b876d449d6c16f273b67b4a9a8e1c09632ade6a5e94a53748ee1f1dd486eca10c6d3ce3cc538a77a344972f56cd41989b77a5f13abfcfe2a949d419f248e1cfd6f0bc1126261c8aa6cc6c9d568be40a27e085f208159f4ffc80900d7068b870f967a1c5fdee6d1072fa7edcf070010caa445ab438028f3de889e90f86612ac0be1e80f9d007a16a39014ba618d7396ca9c34c155e32d32c17310f70bf88871f9fe3acaca554c27d0a7fbe3f3b1fffe0f63127443a77c545e1881e0c73e03d7e2f51d81bf37f83d5a3180717560f876cd867b46b1311ae79a34163f013b43d85d713a7c97884a03d7b979714211ef16385707421facdbf581e633c914340852710e11510c1705a0d5746a32f71852a84474418b5c800921b4fbd8b6a7f03f7baf705106d8376c641024fcaf78a366b4476c55d072ab4eee1a0dee165d6ee64d290dbb017d5020ea5a2c324ee6cd315fcdf49799c5ed9b35c3c5437e6ba55982c7818736ed5bcc82046d92436f2c211cc6963aaad36a4f0aab280", 0x1000, 0x4}, {&(0x7f0000000140)="f318c2d7ed2b908d1386c3ab07f44ae8e8be419d060a4476d74763e1c251f84b12c8c306b09c6035501654c18e9e2b66b78f91f538a85b3fb82651a8a25d1508b2e01cf932182b6ba5fc6830e97131ab55", 0x51, 0x200}, {&(0x7f0000001240)="ab97ec881ff7627f567e8d1134efbbcadf02d888ff5a119be52197047aa516682af799b080a3af6e9441f897f8f8800814f964a65c2eecfd5eef957f7a2a0f5bd1c29d694a648737393412aeb527ebf65828e859dd7d487ceda23d951bf92daff522eda51c0b23c691eb3c4b8573893b28b32beaa6d8c268c721865fbc3ac5eff4be4baf40844c8e170875cc2612b89ed274d65ffc575783d2027af3110f65f6f9bdde631e3aa5467700c01b93ef49affe4f2766e55ef7e45381a6d0d5da612d780c8dd6cb3ba5f9e567b990b011e3749eeec6cc78d8d104d0d8a50099e1c65d", 0xe0, 0x1c4c}], 0x1000a3, &(0x7f00000013c0)={[{'jfs\x00'}, {'!'}, {'*\''}, {','}, {')#@@'}], [{@fscontext={'fscontext', 0x3d, 'root'}}, {@appraise_type}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x39, 0x38, 0x62, 0x35, 0x31, 0x32, 0x3], 0x2d, [0x32, 0x35, 0x35, 0x32], 0x2d, [0x32, 0x30, 0x35, 0x34], 0x2d, [0x65, 0x61, 0x39, 0x37], 0x2d, [0x61, 0x34, 0x37, 0x33, 0x35, 0x31, 0x38, 0x30]}}}]}) openat(r1, &(0x7f00000001c0)='./file0\x00', 0x40800, 0x11) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:38 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0x5c}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46c5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1104.079486][T22754] loop1: detected capacity change from 0 to 128 [ 1104.149491][T22763] loop4: detected capacity change from 0 to 178 [ 1104.161001][T22763] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.161001][T22763] [ 1104.162035][T22754] jfs_mount: Mount Failure: File System Dirty. [ 1104.172169][T22763] ERROR: (device loop4): remounting filesystem as read-only [ 1104.188174][T22763] xtLookup: xtSearch returned -5 [ 1104.194495][T22763] read_mapping_page failed! [ 1104.199037][T22763] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1104.205394][T22763] Mount JFS Failure: -5 [ 1104.209558][T22763] jfs_mount failed w/return code = -5 12:02:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0x7b}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:38 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x2000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1104.306030][T22777] loop3: detected capacity change from 0 to 28 [ 1104.390466][T22789] loop2: detected capacity change from 0 to 178 [ 1104.449642][T22754] Mount JFS Failure: -22 12:02:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0b0000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1104.473464][T22754] jfs_mount failed w/return code = -22 12:02:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f00000000c0)=[{&(0x7f0000000240)=""/252, 0xfc}, {&(0x7f0000000340)=""/206, 0xce}, {&(0x7f0000000440)=""/251, 0xfb}, {&(0x7f0000000140)=""/179, 0xb3}], 0x4, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x80000, 0x18) [ 1104.516101][T22789] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.516101][T22789] [ 1104.526746][T22789] ERROR: (device loop2): remounting filesystem as read-only [ 1104.534352][T22789] xtLookup: xtSearch returned -5 [ 1104.539361][T22789] read_mapping_page failed! [ 1104.544119][T22789] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1104.550873][T22789] Mount JFS Failure: -5 [ 1104.555959][T22789] jfs_mount failed w/return code = -5 12:02:38 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x3000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1104.568024][T22809] loop4: detected capacity change from 0 to 178 [ 1104.581627][T22809] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.581627][T22809] [ 1104.592115][T22809] ERROR: (device loop4): remounting filesystem as read-only [ 1104.599707][T22809] xtLookup: xtSearch returned -5 [ 1104.605591][T22809] read_mapping_page failed! [ 1104.610685][T22809] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1104.619802][T22809] Mount JFS Failure: -5 [ 1104.624486][T22809] jfs_mount failed w/return code = -5 12:02:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0xe1}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:38 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:38 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46f5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1104.676557][T22823] loop3: detected capacity change from 0 to 128 12:02:38 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0c0000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:38 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x7000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1104.721582][T22823] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1104.742337][T22823] Mount JFS Failure: -5 [ 1104.750917][T22823] jfs_mount failed w/return code = -5 12:02:38 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800007, 0x12, r1, 0x0) r2 = accept4$unix(r1, &(0x7f0000000040), &(0x7f0000000100)=0x6e, 0x80000) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r5) fsetxattr$system_posix_acl(r2, &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000000380)=ANY=[@ANYRES32=r5, @ANYBLOB="b445d5749609a98bf851d3ebc864e4ec186bbab84e", @ANYRES32=0xee01, @ANYBLOB="02000300", @ANYRES32=r3, @ANYBLOB="040004000000000010000100000000002000040000"], 0x3c, 0x1) mount$9p_tcp(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x2000000, &(0x7f0000000240)={'trans=tcp,', {'port', 0x3d, 0x4e24}, 0x2c, {[{@mmap}, {@version_u}, {@loose}, {@nodevmap}, {@access_client}], [{@dont_appraise}, {@fsmagic={'fsmagic', 0x3d, 0x100000000}}, {@euid_lt={'euid<', r3}}, {@euid_gt={'euid>', 0xee00}}, {@subj_user={'subj_user', 0x3d, 'jfs\x00'}}]}}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:38 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0xf0}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1104.841636][T22846] loop1: detected capacity change from 0 to 128 [ 1104.893596][T22846] jfs_mount: Mount Failure: File System Dirty. [ 1104.894816][T22851] loop2: detected capacity change from 0 to 178 [ 1104.912034][T22851] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.912034][T22851] [ 1104.927816][T22851] ERROR: (device loop2): remounting filesystem as read-only [ 1104.929940][T22855] loop4: detected capacity change from 0 to 178 [ 1104.936848][T22851] xtLookup: xtSearch returned -5 [ 1104.948452][T22851] read_mapping_page failed! [ 1104.954522][T22851] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1104.960998][T22851] Mount JFS Failure: -5 [ 1104.967167][T22851] jfs_mount failed w/return code = -5 [ 1104.970086][T22855] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.970086][T22855] [ 1104.988777][T22846] Mount JFS Failure: -22 [ 1104.991955][T22855] ERROR: (device loop4): remounting filesystem as read-only [ 1105.003450][T22855] xtLookup: xtSearch returned -5 [ 1105.010048][T22855] read_mapping_page failed! [ 1105.016571][T22855] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1105.024209][T22846] jfs_mount failed w/return code = -22 12:02:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0xe000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1105.052188][T22855] Mount JFS Failure: -5 [ 1105.064131][T22855] jfs_mount failed w/return code = -5 12:02:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4705f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0x11a}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:39 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x18020000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)=ANY=[@ANYBLOB="80"]) 12:02:39 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0d0000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0x150}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1105.346676][T22893] loop2: detected capacity change from 0 to 178 [ 1105.399713][T22893] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1105.399713][T22893] [ 1105.411755][T22893] ERROR: (device loop2): remounting filesystem as read-only [ 1105.414598][T22905] loop1: detected capacity change from 0 to 128 [ 1105.423396][T22893] xtLookup: xtSearch returned -5 [ 1105.433328][T22893] read_mapping_page failed! 12:02:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x19030000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1105.461414][T22912] loop4: detected capacity change from 0 to 178 [ 1105.461722][T22893] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1105.476196][T22893] Mount JFS Failure: -5 [ 1105.478010][T22913] loop3: detected capacity change from 0 to 128 [ 1105.480431][T22893] jfs_mount failed w/return code = -5 [ 1105.484733][T22905] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1105.541136][T22912] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1105.541136][T22912] [ 1105.557192][T22913] jfs: Unrecognized mount option "€ø%ÿ" or missing value [ 1105.580004][T22905] Mount JFS Failure: -5 12:02:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0x182}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:39 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4735f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1105.593707][T22905] jfs_mount failed w/return code = -5 [ 1105.604918][T22912] ERROR: (device loop4): remounting filesystem as read-only [ 1105.641714][T22912] xtLookup: xtSearch returned -5 12:02:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1a010000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:39 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x1b, 0x5b, 0x7, 0x3b, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106d, 0x35}, [{}]}, 0x78) ioctl$BTRFS_IOC_QGROUP_LIMIT(r1, 0x8030942b, &(0x7f0000000040)={0x0, {0x0, 0xb9, 0x8, 0x7, 0x4}}) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000061000)) 12:02:39 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1105.687346][T22912] read_mapping_page failed! [ 1105.700273][T22912] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1105.754208][T22912] Mount JFS Failure: -5 [ 1105.758558][T22912] jfs_mount failed w/return code = -5 [ 1105.774819][T22946] loop2: detected capacity change from 0 to 178 [ 1105.812401][T22946] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1105.812401][T22946] [ 1105.835287][T22955] loop3: detected capacity change from 0 to 128 [ 1105.850590][T22955] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:39 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0x1be}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1105.860926][T22955] Mount JFS Failure: -5 [ 1105.866863][T22955] jfs_mount failed w/return code = -5 [ 1105.873660][T22946] ERROR: (device loop2): remounting filesystem as read-only [ 1105.884467][T22946] xtLookup: xtSearch returned -5 [ 1105.885527][T22963] loop1: detected capacity change from 0 to 128 [ 1105.891613][T22946] read_mapping_page failed! [ 1105.905728][T22946] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:39 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x1e030000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0f0000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1105.919348][T22946] Mount JFS Failure: -5 [ 1105.936814][T22946] jfs_mount failed w/return code = -5 [ 1105.947053][T22974] loop3: detected capacity change from 0 to 128 [ 1106.032921][T22974] jfs_mount: diMount(ipaimap) failed w/rc = -5 12:02:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0x218}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1106.074085][T22963] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1106.099890][T22984] loop4: detected capacity change from 0 to 178 [ 1106.126497][T22984] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1106.126497][T22984] [ 1106.129503][T22974] Mount JFS Failure: -5 [ 1106.152816][T22974] jfs_mount failed w/return code = -5 [ 1106.159812][T22984] ERROR: (device loop4): remounting filesystem as read-only [ 1106.170263][T22984] xtLookup: xtSearch returned -5 12:02:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4755f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x2000, 0x0) mmap(&(0x7f0000153000/0x1000)=nil, 0x1000, 0x0, 0x4010, r0, 0xd8688000) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_elf64(r1, &(0x7f0000000100)={{0x1b, 0x5b, 0x7, 0x3b, 0x0, 0x0, 0x31, 0x0, 0x0, 0x0, 0x0, 0x0, 0x106d, 0x35}, [{}]}, 0x78) dup3(r0, r1, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="009e713056d7686c4762881addc33fd92a229b431eec393f567fe92566ec2a3b9ad479ffff0000a828e49bcf9995453f11a57c98d49fbdb2aaf200be1cb3aa5deb7fb76e15a011acc19b13bc7c3d926e5236d76bd141ac76f5c11858ccc36eaf01e94c144d6b014d687674b6c09f5d1e2febb1472fcc10c704c70f52ebcc67c54eb6c3934958ba83ef70afa87cb1e1ecb0ea331fa8624c6c3f6f35181518995bb119058ed755b93878e8daf90479a2802a20de48d8bd940e6ef6d5602cf4f30dabcd66af7c1486adc11843fcc894b779fb7c1b9b6d6fd99222e99607fdf7f7c8c7aeab85d024bcd57ebeffdca6ab8fd347f7897578"]) setxattr$trusted_overlay_origin(&(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), &(0x7f0000000180), 0x2, 0x1) [ 1106.175563][T22984] read_mapping_page failed! [ 1106.180699][T22984] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1106.184231][T22963] Mount JFS Failure: -5 [ 1106.187220][T22984] Mount JFS Failure: -5 [ 1106.203810][T22984] jfs_mount failed w/return code = -5 [ 1106.233060][T22963] jfs_mount failed w/return code = -5 12:02:40 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f100000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) 12:02:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0x26a}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:40 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x45000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:40 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x2d, 0x8000}], 0x0, &(0x7f0000061000)) [ 1106.376507][T23014] loop3: detected capacity change from 0 to 128 [ 1106.412201][T23014] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1106.500274][T23023] loop2: detected capacity change from 0 to 178 [ 1106.510371][T23014] Mount JFS Failure: -5 [ 1106.540044][T23023] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1106.540044][T23023] [ 1106.560368][T23014] jfs_mount failed w/return code = -5 [ 1106.576491][T23023] ERROR: (device loop2): remounting filesystem as read-only [ 1106.584165][T23023] xtLookup: xtSearch returned -5 [ 1106.589609][T23023] read_mapping_page failed! [ 1106.595755][T23023] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1106.602072][T23023] Mount JFS Failure: -5 12:02:40 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x46000000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1106.606420][T23023] jfs_mount failed w/return code = -5 [ 1106.609905][T23030] loop4: detected capacity change from 0 to 178 12:02:40 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}], 0x0, &(0x7f00000000c0)={[], [{@obj_type={'obj_type', 0x3d, 'jfs\x00'}}, {@smackfsroot={'smackfsroot', 0x3d, 'jfs\x00'}}, {@measure}]}) r1 = dup2(r0, r0) ioctl$UI_SET_LEDBIT(r1, 0x40045569, 0x3) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f0000000040)={0x0, 0x0, {0x36, 0xd, 0x0, 0x1b, 0x4, 0xfc12c67, 0x6, 0x59, 0x1}}) [ 1106.664145][T23030] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1106.664145][T23030] 12:02:40 executing program 0: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x4c, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x0, {0x291}}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) 12:02:40 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4785f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}], 0x0, &(0x7f0000061000)) [ 1106.814345][T23030] ERROR: (device loop4): remounting filesystem as read-only [ 1106.838902][T23030] xtLookup: xtSearch returned -5 12:02:40 executing program 5: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000001340)=@raw={'raw\x00', 0x3c1, 0x3, 0x2e8, 0x0, 0xffffff80, 0x178, 0x150, 0xc7, 0x218, 0x258, 0x258, 0x218, 0x258, 0x3, 0x0, {[{{@uncond, 0x0, 0x108, 0x150, 0xda01, {}, [@common=@unspec=@statistic={{0x38}}, @common=@inet=@socket3={{0x28}}]}, @unspec=@CT0={0x48, 'CT\x00', 0x0, {0x2, 0x0, 0x0, 0x0, 'syz0\x00'}}}, {{@uncond, 0x0, 0xa8, 0xc8, 0x4d030000}, @unspec=@TRACE={0x20}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x348) [ 1106.864784][T23055] loop1: detected capacity change from 0 to 128 [ 1106.883357][T23030] read_mapping_page failed! [ 1106.890343][T23055] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1106.902342][T23030] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1106.909504][T23030] BUG: unable to handle page fault for address: ffffffffffffff80 [ 1106.917214][T23030] #PF: supervisor read access in kernel mode [ 1106.919717][T23055] Mount JFS Failure: -5 [ 1106.923177][T23030] #PF: error_code(0x0000) - not-present page [ 1106.923189][T23030] PGD bc8f067 P4D bc8f067 PUD bc91067 PMD 0 [ 1106.929968][T23060] loop3: detected capacity change from 0 to 128 [ 1106.933281][T23030] [ 1106.933286][T23030] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1106.933304][T23030] CPU: 0 PID: 23030 Comm: syz-executor.4 Not tainted 5.13.0-rc7-syzkaller #0 [ 1106.933323][T23030] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1106.933333][T23030] RIP: 0010:diFree+0x15b/0x2660 [ 1106.933359][T23030] Code: 28 48 8d 78 80 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 a3 1f 00 00 48 8b 44 24 18 <48> 8b 68 80 4c 89 e8 48 c1 e8 0c 48 89 04 24 48 b8 00 00 00 00 00 [ 1106.933381][T23030] RSP: 0018:ffffc9001f9578e0 EFLAGS: 00010246 [ 1106.933398][T23030] RAX: 0000000000000000 RBX: ffff888028836800 RCX: ffffc90011f6e000 [ 1106.933411][T23030] RDX: 1ffffffffffffff0 RSI: ffffffff82b9b3b5 RDI: ffffffffffffff80 [ 1106.933425][T23030] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1106.933438][T23030] R10: ffffffff82b75d85 R11: 0000000000000000 R12: ffff88809eea8db0 [ 1106.933450][T23030] R13: 0000000000000001 R14: ffffffff89a4b8e0 R15: ffff88809eea8cd8 [ 1106.933465][T23030] FS: 00007f8f1e078700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 1106.933484][T23030] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1106.933498][T23030] CR2: ffffffffffffff80 CR3: 000000015e0f7000 CR4: 0000000000350ef0 [ 1106.933512][T23030] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1106.933524][T23030] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1106.933537][T23030] Call Trace: [ 1106.933543][T23030] ? truncate_inode_pages_range+0x45d/0x1030 [ 1106.933570][T23030] ? truncate_inode_page+0xc0/0xc0 [ 1106.969928][T23055] jfs_mount failed w/return code = -5 [ 1106.974276][T23030] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 1106.974312][T23030] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 1106.974337][T23030] ? diWrite+0x1550/0x1550 [ 1107.017018][T23060] jfs: Unrecognized mount option "obj_type=jfs" or missing value [ 1107.023188][T23030] ? __dquot_initialize+0x295/0xbe0 [ 1107.023223][T23030] ? find_held_lock+0x2d/0x110 [ 1107.158496][T23030] ? dquot_free_inode+0x6c0/0x6c0 [ 1107.163537][T23030] ? lock_downgrade+0x6e0/0x6e0 [ 1107.168407][T23030] ? var_wake_function+0x130/0x130 [ 1107.173682][T23030] ? rwlock_bug.part.0+0x90/0x90 [ 1107.178627][T23030] jfs_evict_inode+0x317/0x3d0 [ 1107.183399][T23030] ? jfs_write_inode+0x230/0x230 [ 1107.188355][T23030] evict+0x2ed/0x6b0 [ 1107.192271][T23030] iput.part.0+0x57e/0x810 [ 1107.193651][T23080] loop2: detected capacity change from 0 to 178 [ 1107.196698][T23030] iput+0x58/0x70 [ 1107.196725][T23030] diFreeSpecial+0x73/0x100 [ 1107.196748][T23030] jfs_mount+0x1c1/0x7a0 [ 1107.196766][T23030] jfs_fill_super+0x5bd/0xc80 [ 1107.196783][T23030] ? init_once+0x130/0x130 [ 1107.196798][T23030] ? set_blocksize+0x1c1/0x3b0 [ 1107.196821][T23030] mount_bdev+0x34d/0x410 [ 1107.196843][T23030] ? init_once+0x130/0x130 [ 1107.196858][T23030] ? jfs_get_dquots+0x10/0x10 [ 1107.212204][T23080] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1107.212204][T23080] [ 1107.215445][T23030] legacy_get_tree+0x105/0x220 [ 1107.215477][T23030] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 1107.215503][T23030] vfs_get_tree+0x89/0x2f0 [ 1107.215524][T23030] path_mount+0x132a/0x1fa0 [ 1107.215545][T23030] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 1107.234848][T23080] ERROR: (device loop2): remounting filesystem as read-only [ 1107.240984][T23030] ? strncpy_from_user+0x2a0/0x3e0 [ 1107.241016][T23030] ? finish_automount+0xad0/0xad0 [ 1107.241040][T23030] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 1107.241063][T23030] ? getname_flags.part.0+0x1dd/0x4f0 [ 1107.241086][T23030] __x64_sys_mount+0x27f/0x300 [ 1107.241106][T23030] ? copy_mnt_ns+0xae0/0xae0 [ 1107.241128][T23030] ? syscall_enter_from_user_mode+0x27/0x70 [ 1107.241157][T23030] do_syscall_64+0x3a/0xb0 [ 1107.241178][T23030] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 1107.241200][T23030] RIP: 0033:0x467afa [ 1107.241216][T23030] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1107.241236][T23030] RSP: 002b:00007f8f1e077fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1107.241258][T23030] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1107.241271][T23030] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f8f1e078000 [ 1107.241285][T23030] RBP: 00007f8f1e078040 R08: 00007f8f1e078040 R09: 0000000020000000 [ 1107.241300][T23030] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1107.241313][T23030] R13: 0000000020000100 R14: 00007f8f1e078000 R15: 0000000020061000 [ 1107.241331][T23030] Modules linked in: [ 1107.241340][T23030] CR2: ffffffffffffff80 [ 1107.241354][T23030] ---[ end trace 76ffb46caca29e06 ]--- [ 1107.241363][T23030] RIP: 0010:diFree+0x15b/0x2660 [ 1107.286652][T23080] xtLookup: xtSearch returned -5 [ 1107.289359][T23030] Code: 28 48 8d 78 80 48 89 44 24 18 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 a3 1f 00 00 48 8b 44 24 18 <48> 8b 68 80 4c 89 e8 48 c1 e8 0c 48 89 04 24 48 b8 00 00 00 00 00 [ 1107.289382][T23030] RSP: 0018:ffffc9001f9578e0 EFLAGS: 00010246 [ 1107.289401][T23030] RAX: 0000000000000000 RBX: ffff888028836800 RCX: ffffc90011f6e000 [ 1107.289415][T23030] RDX: 1ffffffffffffff0 RSI: ffffffff82b9b3b5 RDI: ffffffffffffff80 [ 1107.317228][T23080] read_mapping_page failed! [ 1107.317375][T23030] RBP: 0000000000000000 R08: 0000000000000000 R09: 0000000000000000 [ 1107.343681][T23080] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1107.364849][T23030] R10: ffffffff82b75d85 R11: 0000000000000000 R12: ffff88809eea8db0 [ 1107.364866][T23030] R13: 0000000000000001 R14: ffffffff89a4b8e0 R15: ffff88809eea8cd8 [ 1107.364880][T23030] FS: 00007f8f1e078700(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 1107.364899][T23030] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1107.364913][T23030] CR2: ffffffffffffff80 CR3: 000000015e0f7000 CR4: 0000000000350ef0 [ 1107.364927][T23030] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1107.364938][T23030] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1107.364951][T23030] Kernel panic - not syncing: Fatal exception [ 1107.374076][T23030] Kernel Offset: disabled [ 1107.580807][T23030] Rebooting in 86400 seconds..