9bea306bc97a15777e5dd47843d8360e29cbb0de5998e1796bdfa0cc9d1b957fc3568062e4b22145c06e23db192149cff329dfa5327fab604bcc7e8490e1f800960331fd09c1ba003906e935f59e76366dedde666140cf9b09ac1b1b31fb7e936cee5ccbd3406048bcd6334ecdb491e54b27869d26fd8a0b2299980d694e3f0a44b9081b3aaaa18c3d2a280078b739e6c250cdab3f31b66e8add5be7d17f9afd0769053463a2e47ae377bb74af29e25764118", 0xee, 0x2}], 0x0, &(0x7f00000000c0)={[], [{@smackfsroot={'smackfsroot', 0x3d, 'jfs\x00'}}]}) 23:33:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:35 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 988.916321] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 988.916321] 23:33:35 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfc0000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000080)={[], [{@dont_hash}, {@smackfstransmute={'smackfstransmute', 0x3d, 'jfs\x00'}}, {@permit_directio}, {@pcr}, {@subj_user={'subj_user', 0x3d, '-:(!'}}, {@fsname={'fsname', 0x3d, '\'@'}}]}) r0 = syz_mount_image$jffs2(&(0x7f0000000040), &(0x7f0000000140)='./file0\x00', 0x7, 0x3, &(0x7f0000000400)=[{&(0x7f0000000240)="ab4bc9baaeb45883795cf5dca0d4b12d40e35292005c4ddf0ceb863ecbf046310bbf71e394b287bae562f6873ed1e02a5e30f7acbf5c57ab50726b2acf20939f0f44d7f94341ab20eebb1cfbc3bdd87519ef0f1d83979440b289ec343bdc10d27e8c3586e7d694a2615a40385df01be7459c825520ae871a4221cc6511b3ac16ff9e7dc1f72a175261a3ff9e34c156713ee526e1814f995b09f4e6f362581621a0794a0bf27bec8adedf31582b1d3bd56e70", 0xb2, 0x4}, {&(0x7f0000000300)="8efb9bdd36612c778c6d5332462f5341cbfd712604b80b02e7b98ab8ade81824083693d755d0eb62bf8cabaedad619fbfefddf673bd5e73633469705c52f525c0772d873cdcf30f8c6911cea9cec6600c03e5bbc32f394d20ee6c6d9f999cca113f7aeba4fe863d1fd93216a06b66262168827ad3398ee24624ee23d53558d777c044eff24af28ae9cb4578f5c176491e90182c08c1ba068e1fe2ef678a9b24f3add3158ca9f1627ab04ab1cb5348e93d984a338f7a3f91c8dacb6904709b373fe76e03bed5faf479e84e5bcfe8c6d81572ec616ac755dc91e5566f8c50fe31096a9042901248a5d", 0xe8, 0x5}, {&(0x7f0000000180)='-x', 0x2, 0x8}], 0x2000, &(0x7f00000004c0)=ANY=[@ANYBLOB='compr=none,euid>', @ANYRESDEC=0xee00, @ANYBLOB="2cf4fe5cba85cbb4de12450faa7471964639399c4a66ebc099e91e4fea186f9abb"]) openat(r0, &(0x7f0000000480)='./file0\x00', 0x40, 0x102) [ 989.037306] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 989.037306] 23:33:35 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000006001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:35 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:35 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100b000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:35 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000100)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x8000, &(0x7f00000001c0)=ANY=[@ANYBLOB="16d3285dbb9ade1d8349e7ba39025b3ec6eb329bace24ffc220e44177e0509f7e0f9793e04076a95417a1a174f937e29afb88e7040681702ee166a85b4b21c17bedf3e3f434113aadce0ed81fee6a94b445a8a1370e841bb1530a00bbd2750"]) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) accept(r0, &(0x7f0000000340)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000000c0)=0x80) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000240), 0x3000) [ 989.137895] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 989.137895] [ 989.213505] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 989.213505] 23:33:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:35 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000020000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:35 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100f000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:35 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:35 executing program 0: statx(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x6000, 0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) r4 = geteuid() syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0xfffffe34, 0x8000}], 0x0, &(0x7f0000000340)={[{}, {@uid={'uid', 0x3d, r0}}, {@uid={'uid', 0x3d, r2}}], [{@fowner_gt={'fowner>', r3}}, {@uid_eq={'uid', 0x3d, r4}}, {@dont_measure}]}) 23:33:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 989.433955] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 989.433955] [ 989.558274] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 989.558274] [ 989.567679] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 989.567679] 23:33:35 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000007001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:35 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:35 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:35 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000023000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:35 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001010000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 989.818392] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 989.818392] [ 989.841005] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 989.841005] 23:33:36 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="a3"]) 23:33:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 989.955733] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 989.955733] 23:33:36 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001023000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:36 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000009001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 990.021714] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 990.021714] 23:33:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:36 executing program 0: r0 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$FUSE_INIT(r0, &(0x7f0000000280)={0x50}, 0x50) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000027c0)={0x0, 0x0, 0x0}, &(0x7f0000002800)=0xc) stat(0x0, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = getuid() stat(&(0x7f0000002780)='./bus\x00', &(0x7f0000002900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = accept4$unix(r0, &(0x7f0000002840)=@abs, &(0x7f0000000040)=0x6e, 0x80800) getsockopt$sock_cred(r6, 0x1, 0x11, &(0x7f00000000c0), &(0x7f00000026c0)=0xc) syz_fuse_handle_req(r0, &(0x7f0000000300)="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", 0x2000, &(0x7f0000004e00)={&(0x7f0000000180)={0x50, 0xffffffffffffffda, 0x9, {0x7, 0x21, 0x0, 0x200, 0x0, 0x7fff, 0x5, 0x2}}, &(0x7f0000000200)={0x18, 0x0, 0x9, {0x2}}, &(0x7f0000000240)={0x18, 0x0, 0x5}, &(0x7f0000002300)={0x18, 0x2e6c1f7af7c8d881, 0x3ff, {0x9}}, &(0x7f0000002340)={0x18, 0x0, 0x4, {0x2}}, &(0x7f0000002380)={0x28, 0xfffffffffffffff5, 0xe91e, {{0x8, 0xa65d, 0x2}}}, &(0x7f00000023c0)={0x60, 0x0, 0x1, {{0x0, 0x7, 0x5, 0xff, 0x4, 0xf73, 0xffffffff, 0xc2df}}}, &(0x7f0000002440)={0x18, 0xfffffffffffffff5, 0x6}, &(0x7f0000002480)={0x1b, 0x0, 0x2, {'-,,[)%#@#*\x00'}}, &(0x7f00000024c0)={0x20, 0x0, 0x100000001, {0x0, 0x1e}}, &(0x7f0000002500)={0x78, 0x0, 0x4, {0x3, 0x3f, 0x0, {0x0, 0xe7fa, 0x100000000, 0x0, 0x5, 0x0, 0x89, 0x8000, 0xfffffffa, 0xa000, 0x2, 0xee00, 0x0, 0x86, 0x7}}}, &(0x7f0000002580)={0x90, 0xffffffffffffffda, 0x7, {0x1, 0x3, 0x2, 0x3, 0x6, 0x7, {0x3, 0x8, 0x4, 0x4, 0x3, 0x8, 0x7, 0x81, 0x7, 0xc000, 0x1, r1, 0x0, 0x7fff, 0x8000}}}, &(0x7f0000002640)={0x48, 0x0, 0xbaf, [{0x5, 0x6}, {0x3, 0xfffffffffffffffe, 0x1, 0x7, '\x00'}]}, &(0x7f0000002a40)={0x158, 0x0, 0x7, [{{0x1, 0x2, 0x7ff, 0x4, 0x1000, 0xfffffffc, {0x3, 0x3, 0x9, 0x0, 0x0, 0x3ff, 0x836b54c, 0x8, 0x0, 0x1000, 0x9, r1, r3, 0x1, 0x7ad8}}, {0x5, 0x20, 0x6, 0x49f, '-.&\'$}'}}, {{0x0, 0x0, 0x9, 0x9, 0x81, 0x0, {0x0, 0x0, 0x1, 0x40, 0x2, 0x101, 0x0, 0x23f4, 0x8, 0x0, 0x7fff, 0xee01, r2, 0x0, 0x791}}, {0x0, 0x3, 0xa, 0x7fffffff, '\\&@\\[**@:]'}}]}, &(0x7f0000004d40)={0xa0, 0x0, 0x5, {{0x0, 0x0, 0x80000000, 0x800, 0x7, 0x0, {0x3, 0x4, 0xfffffffffffffffb, 0x7fffffff, 0x9, 0x401, 0x9, 0x0, 0xfff, 0x0, 0xff, r4, r5, 0x81}}, {0x0, 0x18}}}, &(0x7f0000002bc0)={0x20, 0x0, 0x3, {0x3, 0x0, 0x2, 0xd5}}}) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x6, 0x1, &(0x7f0000000080)=[{&(0x7f0000000140)="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", 0x118, 0x8000}], 0x42030, &(0x7f0000002980)={[{@gid={'gid', 0x3d, 0xee01}}, {}, {@quota}, {@resize_size={'resize', 0x3d, 0x5}}, {@discard_size={'discard', 0x3d, 0x6}}, {@nointegrity}, {}, {@usrquota}]}) 23:33:36 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600003f000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 990.209259] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 990.209259] 23:33:36 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000b001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:36 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001082020c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 990.317331] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 990.317331] 23:33:36 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x5, &(0x7f0000001400)=[{&(0x7f00000000c0)="cc5b181097081de437dcdb31111a6ed8441de61f35e640b96fae6b33dcbcef318ffd719849e39b2db01ff6d75087dc513071524ff1626947fd2163b653e3bcae028428861018eeefa0765e3da4ebd8ad71579c032d40183af88a97034554c811256d0e0fb4fe846577cebea606913df0fdf6b9757d0ee73e5983a97e5f4bc935410f5f2e3f5f315edc8b", 0x8a, 0x40}, {&(0x7f0000000180)="5de228eb442688a9312bf896ee3dd49a3ecfb6c43e7784e054d451e5a3c2b7ad2976e193bee07ea84c3538c2db52b3329be2fce3c10ddcf5bb151387cb1563805b36fc96ed1838f8bf", 0x49, 0x5}, {&(0x7f0000000200)="2b45269d44c2df5d93679d333f5c28abb9cdd19c58724d8b1da62f3d38bfdacd1db643cb4f714feda48eb6f760107d4291401146488d3f821d8411e058989d69f56a26366f1b1478c7c8e9d29222ae48e016dbe9e49af490d8ff04c0fcc2fe0d2a25ee4d47378f87b976beb013e1fb2b49f4e848fd1395b1da33fc932594d6dfa30cb1abce9cfc7e63caa0e270e2b10cf1be85261e83391a01c7d390e5b0a60b6233ce02e56cb1a159ec2200efa77dbbaef764f52df10e69ac4b5fd47f902481861beec27803f63fc5b7ea3da65c3ddd4d8a99d2", 0xd4, 0x9}, {&(0x7f0000000300)="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", 0x1000, 0x7}, {&(0x7f0000001300)="25ca3e753c7875d29b8272d13032469ca7c4b920971620fe30267f52d2129107e98a2cf93788df0e30cd7d7d1e512ee23187fbe8bfd16829e24aac96785dc12b944cd9243304dedc606fc098ab46b364f00c855571fde6e7469f3eb885aec2941fde5e4677ffa2bc93171be426190359cb2c0d06a8431511af1b54b3450a88c2d7b06fb66b1ede39e99304863fe502b67c474a88880486db1426beb984a2dcf0fbf82a9e8fffd01882bfd12985209c8ec632dbba44493cbd2c36cfab6d06e0428ae5fff596fa43a8df8e840927c2ece4ac38d00d9a59ab6028570152181f1c7ef68b3c9fdd", 0xe5, 0x9}], 0x0, &(0x7f0000000040)) write$P9_RREADDIR(0xffffffffffffffff, &(0x7f0000001480)={0xa6, 0x29, 0x2, {0xd7, [{{0x1, 0x4, 0x1}, 0x10000, 0x7, 0x7, './file0'}, {{0x0, 0x4, 0x1}, 0x5, 0x20, 0x7, './file0'}, {{0x4, 0x3, 0x3}, 0x80, 0x2, 0x7, './file0'}, {{0x80, 0x1, 0x3}, 0x1, 0x8, 0x7, './file0'}, {{0x10, 0x2, 0x6}, 0x1f, 0x0, 0x7, './file0'}]}}, 0xa6) 23:33:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 990.416333] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 990.416333] [ 990.436568] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 990.436568] 23:33:36 executing program 0: r0 = socket(0x22, 0x5, 0x400) shutdown(r0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000000)={{{@in, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in=@local}}, &(0x7f0000000100)=0xe8) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x4e23, @multicast1}, 0x10) openat$cgroup_ro(r2, &(0x7f0000000180)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000140)={@private2, r1}, 0x14) 23:33:36 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000040000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 990.510722] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 990.510722] 23:33:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:36 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000030c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:36 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000c001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:36 executing program 0: write$RDMA_USER_CM_CMD_JOIN_MCAST(0xffffffffffffffff, &(0x7f0000000140)={0x16, 0x98, 0xfa00, {&(0x7f0000000080), 0x4, 0xffffffffffffffff, 0x1c, 0x1, @in={0x2, 0x4e20, @remote}}}, 0xa0) write$RDMA_USER_CM_CMD_RESOLVE_IP(0xffffffffffffffff, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x4e21, 0x7, @mcast2, 0x1000}, {0xa, 0x4e21, 0x0, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1000}, 0xffffffffffffffff, 0xdd}}, 0x48) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="e71214dce74d17d11220"]) [ 990.675608] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 990.675608] 23:33:36 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:36 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:37 executing program 0: pipe(&(0x7f00000000c0)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r3, 0x0, 0x30009, 0x0) openat$incfs(r0, &(0x7f00000003c0)='.log\x00', 0xd0141, 0x112) socket$can_bcm(0x1d, 0x2, 0x2) ioctl$VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000280)={0x7, 0x1, 0x4, 0x70000, 0x3, {}, {0x3, 0x2, 0x6d, 0x4, 0x1f, 0xbd, "941351b9"}, 0x4, 0x1, @planes=&(0x7f0000000240)={0xfbd5, 0x101, @fd, 0x4}, 0x2, 0x0, 0xffffffffffffffff}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r5, 0x407, 0x0) r6 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000300), 0x406002, 0x0) getsockopt$CAN_RAW_FILTER(r6, 0x65, 0x1, &(0x7f0000000340), &(0x7f0000000140)) write$binfmt_misc(r5, &(0x7f0000000040)=ANY=[], 0x4240a2a0) splice(r4, 0x0, r5, 0x0, 0x200000000008, 0x0) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000000080)=[@timestamp, @timestamp], 0x2) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="e3"]) [ 990.826916] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 990.826916] [ 990.830553] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 990.830553] 23:33:37 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:37 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:37 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:37 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000048000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:37 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:37 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:37 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000050c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:37 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000d001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 991.003749] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 991.003749] 23:33:37 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 991.103267] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 991.103267] 23:33:37 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf9, 0xf9, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x118}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:37 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 991.193589] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 991.193589] [ 991.292865] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 991.292865] 23:33:37 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf9, 0xf9, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x118}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:37 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000060c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:37 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:37 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600004c000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:37 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000f001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:38 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000070c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 991.866276] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 991.866276] [ 991.901245] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 991.901245] 23:33:38 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf9, 0xf9, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x118}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:38 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000060000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:38 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r1, 0x407, 0x0) r2 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$FUSE_INIT(r2, &(0x7f0000000280)={0x50}, 0x50) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000027c0)={0x0, 0x0, 0x0}, &(0x7f0000002800)=0xc) stat(0x0, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getuid() stat(&(0x7f0000002780)='./bus\x00', &(0x7f0000002900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r2, &(0x7f0000000300)="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", 0x2000, &(0x7f0000004e00)={&(0x7f0000000180)={0x50, 0xffffffffffffffda, 0x9, {0x7, 0x21, 0x0, 0x200, 0x0, 0x7fff, 0x5, 0x2}}, &(0x7f0000000200)={0x18, 0x0, 0x9, {0x2}}, &(0x7f0000000240)={0x18, 0x0, 0x5}, &(0x7f0000002300)={0x18, 0x2e6c1f7af7c8d881, 0x3ff, {0x9}}, &(0x7f0000002340)={0x18, 0x0, 0x4, {0x2}}, &(0x7f0000002380)={0x28, 0xfffffffffffffff5, 0xe91e, {{0x8, 0xa65d, 0x2}}}, &(0x7f00000023c0)={0x60, 0x0, 0x1, {{0x0, 0x7, 0x5, 0xff, 0x4, 0xf73, 0xffffffff, 0xc2df}}}, &(0x7f0000002440)={0x18, 0xfffffffffffffff5, 0x6}, &(0x7f0000002480)={0x1b, 0x0, 0x2, {'-,,[)%#@#*\x00'}}, &(0x7f00000024c0)={0x20, 0x0, 0x100000001, {0x0, 0x1e}}, &(0x7f0000002500)={0x78, 0x0, 0x4, {0x3, 0x3f, 0x0, {0x0, 0xe7fa, 0x100000000, 0x0, 0x5, 0x0, 0x89, 0x8000, 0xfffffffa, 0xa000, 0x2, 0xee00, 0x0, 0x86, 0x7}}}, &(0x7f0000002580)={0x90, 0xffffffffffffffda, 0x7, {0x1, 0x3, 0x2, 0x3, 0x6, 0x7, {0x3, 0x8, 0x4, 0x4, 0x3, 0x8, 0x7, 0x81, 0x7, 0xc000, 0x1, r3, 0x0, 0x7fff, 0x8000}}}, &(0x7f0000002640)={0x48, 0x0, 0xbaf, [{0x5, 0x6}, {0x3, 0xfffffffffffffffe, 0x1, 0x7, '\x00'}]}, &(0x7f0000002a40)={0x158, 0x0, 0x7, [{{0x1, 0x2, 0x7ff, 0x4, 0x1000, 0xfffffffc, {0x3, 0x3, 0x9, 0x0, 0x0, 0x3ff, 0x836b54c, 0x8, 0x0, 0x1000, 0x9, r3, r5, 0x1, 0x7ad8}}, {0x5, 0x20, 0x6, 0x49f, '-.&\'$}'}}, {{0x0, 0x0, 0x9, 0x9, 0x81, 0x0, {0x0, 0x0, 0x1, 0x40, 0x2, 0x101, 0x0, 0x23f4, 0x8, 0x0, 0x7fff, 0xee01, r4, 0x0, 0x791}}, {0x0, 0x3, 0xa, 0x7fffffff, '\\&@\\[**@:]'}}]}, &(0x7f0000004d40)={0xa0, 0x0, 0x5, {{0x0, 0x0, 0x80000000, 0x800, 0x7, 0x0, {0x3, 0x4, 0xfffffffffffffffb, 0x7fffffff, 0x9, 0x401, 0x9, 0x0, 0xfff, 0x0, 0xff, r6, r7, 0x81}}, {0x0, 0x18}}}, &(0x7f0000002bc0)={0x20, 0x0, 0x3, {0x3, 0x0, 0x2, 0xd5}}}) r8 = open(&(0x7f0000000100)='./bus\x00', 0x141042, 0x0) write$FUSE_INIT(r8, &(0x7f0000000280)={0x50}, 0x50) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000027c0)={0x0, 0x0, 0x0}, &(0x7f0000002800)=0xc) stat(0x0, &(0x7f0000002700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r12 = getuid() stat(&(0x7f0000002780)='./bus\x00', &(0x7f0000002900)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) syz_fuse_handle_req(r8, &(0x7f0000000300)="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", 0x2000, &(0x7f0000004e00)={&(0x7f0000000180)={0x50, 0xffffffffffffffda, 0x9, {0x7, 0x21, 0x0, 0x200, 0x0, 0x7fff, 0x5, 0x2}}, &(0x7f0000000200)={0x18, 0x0, 0x9, {0x2}}, &(0x7f0000000240)={0x18, 0x0, 0x5}, &(0x7f0000002300)={0x18, 0x2e6c1f7af7c8d881, 0x3ff, {0x9}}, &(0x7f0000002340)={0x18, 0x0, 0x4, {0x2}}, &(0x7f0000002380)={0x28, 0xfffffffffffffff5, 0xe91e, {{0x8, 0xa65d, 0x2}}}, &(0x7f00000023c0)={0x60, 0x0, 0x1, {{0x0, 0x7, 0x5, 0xff, 0x4, 0xf73, 0xffffffff, 0xc2df}}}, &(0x7f0000002440)={0x18, 0xfffffffffffffff5, 0x6}, &(0x7f0000002480)={0x1b, 0xfffffffffffffff5, 0x2, {'-,,[)%#@#*\x00'}}, &(0x7f00000024c0)={0x20, 0x0, 0x100000001, {0x0, 0x1e}}, &(0x7f0000002500)={0x78, 0x0, 0x4, {0x3, 0x3f, 0x0, {0x0, 0xe7fa, 0x100000000, 0x0, 0x5, 0x0, 0x89, 0x8000, 0xfffffffa, 0xa000, 0x2, 0xee00, 0x0, 0x86, 0x7}}}, &(0x7f0000002580)={0x90, 0xffffffffffffffda, 0x4, {0x1, 0x3, 0x2, 0x3, 0x6, 0x7, {0x5, 0x8, 0x4, 0x4, 0x3, 0x8, 0x7, 0x81, 0x7, 0xc000, 0x1, r9, 0x0, 0x7fff, 0x80}}}, &(0x7f0000002640)={0x48, 0x0, 0xbaf, [{0x5, 0x6}, {0x3, 0xfffffffffffffffe, 0x1, 0x7, '\x00'}]}, &(0x7f0000002a40)={0x158, 0x0, 0x7, [{{0x1, 0x2, 0x7ff, 0x4, 0x1000, 0xfffffffc, {0x3, 0x3, 0x9, 0x0, 0x0, 0x3ff, 0x836b54c, 0x8, 0x0, 0x1000, 0x9, r9, r11, 0x1, 0x7ad8}}, {0x5, 0x20, 0x6, 0x49f, '-.&\'$}'}}, {{0x0, 0x0, 0x9, 0x8, 0x81, 0x0, {0x0, 0x0, 0x1, 0x40, 0x2, 0x101, 0x0, 0x23f4, 0x8, 0x0, 0x7fff, 0xee01, r10, 0x0, 0x791}}, {0x0, 0x3, 0xa, 0x7fffffff, '\\&@\\[**@:]'}}]}, &(0x7f0000004d40)={0xa0, 0x0, 0x5, {{0x0, 0x0, 0x80000000, 0x800, 0x7, 0x0, {0x3, 0x4, 0xfffffffffffffffb, 0x7fffffff, 0x9, 0x401, 0x9, 0x0, 0xfff, 0x0, 0xff, r12, r13, 0x81}}, {0x0, 0x18}}}, &(0x7f0000002bc0)={0x20, 0x0, 0x3, {0x3, 0x0, 0x2, 0xd5}}}) fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000240)='system.posix_acl_default\x00', &(0x7f0000000280)={{}, {0x1, 0x6}, [{0x2, 0x2, 0xee01}, {0x2, 0x1}], {0x4, 0x4}, [{}, {0x8, 0x1}, {0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x1, r5}, {0x8, 0x0, r10}, {0x8, 0x4, 0xee00}, {0x8, 0x1, 0xee01}, {0x8, 0x4}, {0x8, 0x3, 0xee01}], {0x10, 0x6}, {0x20, 0x3}}, 0x7c, 0x1) write$binfmt_misc(r1, &(0x7f00000001c0)=ANY=[@ANYRESHEX=r0, @ANYRES32=r0], 0x4240a2a0) sendmsg$NFQNL_MSG_CONFIG(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x2c, 0x2, 0x3, 0x3, 0x0, 0x0, {0x1, 0x0, 0x2}, [@NFQA_CFG_QUEUE_MAXLEN={0x8, 0x3, 0x1, 0x0, 0x72}, @NFQA_CFG_MASK={0x8, 0x4, 0x1, 0x0, 0x25}, @NFQA_CFG_FLAGS={0x8, 0x5, 0x1, 0x0, 0x3}]}, 0x2c}, 0x1, 0x0, 0x0, 0x800}, 0x4000001) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) 23:33:38 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 992.056058] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 992.056058] 23:33:38 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000090c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:38 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:38 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:38 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000020001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 992.184040] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 992.184040] 23:33:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:38 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000068000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:38 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:38 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 992.429691] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 992.429691] [ 992.446883] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 992.446883] 23:33:39 executing program 0: r0 = syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f00000001c0)=0x0) syz_mount_image$bfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x8, 0x0, &(0x7f0000000180), 0x21e1840, &(0x7f0000000340)={[{'!'}, {'^{'}, {'++^[c-'}, {'jfs\x00'}, {'['}, {':}/'}, {'jfs\x00'}, {'jfs\x00'}, {'@&'}], [{@func={'func', 0x3d, 'POLICY_CHECK'}}, {@fowner_gt={'fowner>', r1}}, {@dont_hash}, {@dont_hash}, {@smackfstransmute={'smackfstransmute', 0x3d, '@'}}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '*'}}, {@pcr={'pcr', 0x3d, 0x27}}, {@appraise}, {@measure}]}) statx(r0, &(0x7f0000000080)='./file0\x00', 0x2000, 0x40, &(0x7f0000000240)) 23:33:39 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000b0c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:39 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:39 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600006c000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:39 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000023001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="04"]) 23:33:39 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x1, 0x0, 0x5, 0x0, 0x0, [{}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 993.056479] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 993.056479] [ 993.065712] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 993.065712] 23:33:39 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000f0c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x1, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="096b0cee394363f4ddd60b1f46b345478faf79050130e6a03923cdc2e4b825adbe53272097a0bc2955963de39f1553cf48dfa54f014302670669692634295fe44957c21d8ad7c14f7d5716e229962ed51af1288776947eb4fe2e98409146fcc8e5b7e9a37b57ec9fc71604016f8167cf3d14a30cbffa9a07e9ecbfaeb986e1a99c4cf603aa907b7db03cbd755221341f6302e69b2c7809816167f4a570fbbf869e20d3afbbcd837a10c3f9913ddb9c164f31334ad177715bacd197dec890a6907bf9df19f1"]) 23:33:39 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 993.210120] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 993.210120] [ 993.222450] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 993.222450] 23:33:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0x4, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x120}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:39 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) gettid() rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) 23:33:39 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000074000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="98c6931f7f586a912f0ed60e0b1cb0d900cd733683e2a9676f38b6dea76a41acfbf3d3061582ce18435c6842df469db23a08f8615e4cad6d91d805eeba85bb5d32e54a46fb0fd5cb42dd2eba2c463e"]) 23:33:39 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000003f001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0x4, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x120}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x6}], 0x0, &(0x7f00000000c0)) newfstatat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', &(0x7f0000000100), 0x5800) 23:33:39 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000200c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x104, 0x104, 0x4, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x120}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x912021, &(0x7f0000000040)=ANY=[@ANYBLOB]) syz_mount_image$pvfs2(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x132, 0x1, &(0x7f0000000140)=[{&(0x7f0000000240)="0b6a86efa92d49c05e4f83d0249a2ebe48fb10c52b256d75f900cd06bf069245d7702ad24e420b23e552823c811ecd4d64a84c7b727ca92124968c9e244615a0315585a9b6ee6a880e6a9b2904f95e1b7cb5cbb371d62749a50dd0d250717451a7b2d9f2f080d14f2dcc0afde87a9856d8ef02742c256421a1562cd3ced6a9d1b78bed5cc5db6dccfd80bf594af26078ff8cff76c669b22ecdec525c2ff45be1c40627df03bc7b45f6d3ca9fdab9d90aa2af157481d1b473881e999b89bdb715373a8ad454a4503e7b02fa02cd252516c293b17efbada15757a37d9358407e69989f1fc4003c8098bbd1399bfe09057f7e784665742244d0017328bc6c368fd7e1c0ddd1b89c9a59f618b0403de894b2d43c9ed0c0219fa46c2fe66299b541bf3a41db2ab94e27e725ca7a2946ce92a993ef23b5ca6a4bd82be537375e56d3648ee4f28c3d3520855b1a869f80ee4db4ca9f4efd3bf499838e971b25d9ccdd5cf344d8ee97e09cba6924653b637f804b5fb2ce8acbf14e458600d32080b792dbb34131e2bbca606d1902b578803b6882d6a5467317220e5217447bce2e151d3ea6bab946b5da077794924e8a8d1da630f7abd761fe0da1b89f79b673074af18fe9491956217dc54c4b34cbd8a59e4aed6d555bc72ccdd2871e2efeeb1f43bdabaccf33e606ca954452f1b5e71678b5073861c0b2a8175d3a7132257ce08af8b7655ab986d3ece37db2b4596a1c95cd024cb11312a08f48604056d9166bb9a23e77938991eb37cfa7d509837d5187cf30a240ccc5891deb951fda2c57b7bdcaa88704bfd5ffdbe520e113a2b2f9b3bc837e22171fe84ec5173b5f72a76f1d74591f518ef82a84b5f7d2126840bf088a265803090414055696ba362b2542f6c557bb8a841cccd6153398083d543e4d04f68300bda45f65eb8404a6a1d9bf96db9ad75c4ffc6182ab1cbdb26d7fc88c3199f4716d2a1cdc24ac8565649efc016f4de2d19dc8e2d05cce85a9779eed9fa1ca7eebbe467c859f66a278079aaf4f6f01785bb121a2999acf07de8848dd7fbbbd38ab46fa50b9f96230a54ee5dc725a7a0e5f41c36e245c530d3bd1ff35ba959a667ace3b58885f6c9c4b4fe327d4ab043cd78568b7f0cdc4633a59a73b90d065d22912853e8d8f264a529ddcbdd0f067d0c204cd010ab5a76759762a61bd3c4821cd6a33f843ace7940acf0fe8898b9e445bf4cfbc83a7bc2feca0af9003cf4996be224f19ca292227b97501f500c7c467332ec2523bed7b60346072f3d49f5947de3f4f8718af4019cf409caa12b292db758dfad97fea469f8b4621c80d4ba63925598bf1fb053ab4d8d7474ca5e924ddcc60040bb9968dd1eaa0c81e7d4cce00b05b68ba3015e2cf58c9f756807a540cb0ce7910dcf3b96857f088d517d145a7becec943b0ebb11382acb65efbbe6277f1f1fcd457308ef57e30db0383a25125e6c13fd110dcfccdc4afd949274a7ee480d1efb91dd4aba06723f58172c1185a989eb2368978ecf3612678eaf93c7d3406101850d3d1e218003ab45473d728c89075ade55f4427d98cd557b55974a2a2da543d1fdbc15e9bed74eba4b68cd74f586d945e05e4e71309020b69334247dd204f0d87e871fe2cab36c688c4316a0534f8b8df3dd00c568d8c182fbd7d275e06b33f2b6d399054bb813a4f679631b5f39575499f9725a61133b63f3c666bf7c71e8410a6f3d84c1d18974fd6cb4128e7d0740a614f51c4fd0fe2bee4d4085984cd273ecf63adeb0dad08455a77fe54c9542ddefc61f75f0931af1eb1b2a9a1f7bb304befcda964810275438f95b2d4e41c0ed8f904b5f35a1d2cdd72d08423c3afa30f2ddf61a644639d78eaf1c86aa3c64d7558837623a802d245f0743a740cba414bd0597fca7ba904f7a6b675297b0060d24a36028867e61726aeeee6880954e3d142b25263ab8b0a114bf4db1d7116acc67f475daaebd19cbf50bac9aed5c025852cc947226cb03d9c3a981570efa58d9b170fbc51c987f496792c012d0a02fac295e43765ccb8eed56c069ef5c83aac82d754cd9a23cb6ac3db06da8ca9c352f9f05cc61146c1c3ba0e85fc291a17374e39c91a91c21e0e98169b337557aa23b0f7ddaf86257002b75e3e1be699d45540ee0f7d7d2baa571bf7ec5274e1c42eadc8420083a62bf9bc6957ebcefa82ac2c512982813cc84e1a2cb4737e35e927c76f86d6a094223ca92a41d0357e2b69d32510afba703bb91df33ffe79381dd7296811ebce1430d7ea16361cf943d5fdf137816d02763107ffb6092d661a77d5b702d82c81b843e99ac80013cc4a4925f3ae3f80161284d5325bcad95bee61cfc99a2be8c5cee0520f816915614d87f6aefd18bda848e59b36d9b7cd1c8108f6616cf928bc8c7ddb686ea2f592a2b7e85907bcbec33a236d47490ea97949065a874436efbb0f0f70204fb25532fa3e2158ddd86fd014522af6fc56621c78279e20c038f5c5c889a7d2c981a1686d0f8a618103333d123d9fc034859c229ad8ffc2797e6339fe65fabfb128a14609570dce44eee911b65c6a3623d54fb3ec7f93531f29769f9ad31825e66edc5b4faaf38916c14ad3b077e1207e329a5503a66a3837d2fbbc6779801394f193c7cd66fcd38b6071f5ffc44f889cbfd713b47321edbfe0e5ee05eb74969568dd12832950cebcb8cb869fe5205b6a4d23d77bed5953d210e5c479affdc02424347d223bd7284c114e90c7a1254384bbdd211b8ed3c6087de238524cdd41ed4ee0481ce1da40976f8290a3a3a38a56552affe685892a0c5a1f694f4535b93c252b1a8ff5ccd9cfa1e1db8caccfc0db19612bf31fc34e2225fadc8151ef658f12c751c205c3b5307c89be4cbd2020ffcaaeab6b68d22046b96900f500120bc7d27a655c465ad717461987046929d5c58cb54b095c51fe2a0b0030d2791679bc1ffe69cb24cdcc1c3abb38bea86b2fc11ae33305735aeb66c6476f43b22e3f5e9a19332a59e65948b4502767bf947800e765748cfc13c5168be31720f980b9e0888ed29661a07216416221b75406a14a09e713fbaaf0c05592585fa9db8f4b9c3b82a203e5c07e6382ca560032ccf0ff229d6d9af965403a38df63c19f8b3c79a0b520f719800a487580596a594c934b1ab5fbc0f299dc19c3f03bd38c3d6c8b6a2275480b7938698c7032ee247790831580197c5fbf6704b766afbcdfbb512af07aaeb3eacec067dfcd43c21c88c91d5c2e4859b8672faf5839153b28268fc2f55d506353c1dadc047da32363485c1a704bc46cb6ce9e0e07022997748979881bbfb0892ab42ed69adb1482fd7013cf1f3c769169448d0511ff84c1657b34b06283514390d4dcee9a035aace37362c5fbbcb40b291b60d8abed4f8c617e46a1a22d6fcc9aca57b3ff9c9a738b2fa38e303c7b5129b5bf9c8ce1fdf5cf79ed0f276437bdef340781a06608d78afc0e7d369186496d1df7515f3e31cf814661e292ea6bd496cdf1a0ab2ddf27112828fc50b46a94180640eb2d648545dff0e2fb282c392410c05695e44a8f20f4e8a8b9af419e62a15e4c484f50eae1ebe59bb5b893a25553880b7853482e50e2223f0d0711963d86b1d63d4a171f909f5e7517fda44b2934f9ff9f31e8dcb8dfb37ce4edf443d6ed7dcd34fc6ecce9581c8481458bdbba388f9d40efe28ed566356492e947b2cf4c79d654d1775d667262ff259671fe7c541f750a8fd04c41e2867bff5e0eeeb915b01b95579bf85abfef3a353f6018fa660133a7f133f1b8b63744d256ed36cc1d98f562b4306f138a04ecc38c9a07a01ff6d2f958c59fa560fe3a08f25b6aaa18da9bcec80faabb05ca5ba8976abbdf2fc765aca186a6f064f9464847077667e75be37c84c24ed8a8ca08b18a234acc348b1d824d4f1cd94c803bebe23c28e315d015e8ee44f36bb03f85e33c5244832220c2ce13a5511daedbe4be52262d9cbb94c24458b609cddc1e9be0c22808b0be91f94cbea38179dd32a990cdf9643dc31012c3906cbc69f64b3fe706623d4f4f25e759a52e5cf161e99f9a015f073b79a09455a79e9e6e91b85f540d98fa9d9d0de0b52214397aef3b7f5b54decbb7e384cecd43a40b75677149705dae72417aef8d1f12fbbf5ba31b09aa8104cccfc9040f3aa91bca66412fbf5f91067761804c6f8f3ec9b36c849dd40bff032b70e5adfbe3f9dc87052195af9d8b439efa7ff4c936d122bc8d2f688f56654b75e5fb8f9f1199f013076faa9be876b7d310323f0fe3191e36d9084c5939ed06757481f427aa634a44eb533a90624f1af917181c51b54ef71b7e67bebdbc75c39bb2a01a71210d4575d2630fbd77a8befac469ac346d7137de1bf5041bec942cbd21b7fe7c27b043e96069bf2ed2bd061e75fe19a6f70d208db1529e05ee29a4c5dfae9c6e36aa8f1047d6fc9e582da4b55bc38418e89dd5ef8090d1c56666a4d6814e744b2acd42a4d8d865537d009f08ffb1e22300b61f5dea28e4553764a0845fbf4824898ddee51878279c4f365cbe055f6645fe1d38f1319ba6c2a9a744d6c4db57a040069b3025cf83c36a7cfe7f80905ab78ab4451e698c9d950dac79fdb4aa9a8920d1ca7d7c7c699dcfb77e46dbe62e3691448ba9ca3eb37cf1d6ac84f0a927a2c4138832c0def40fe6d3f4a6946a53ee806f03f0a4ea8e4283beb9c412f1b3ea1ac5f8b32149c367542631a2ca7906c712a8b335d9cbaa58057e1e25e1204c29b930bf1086e5feb6a60fdef8f2acd580c976cc1d36e1a5ab110ee5ea33451402943c018b3ef0d78242406e27e8ff706b82dcfbacbe22babaf17e5b4171ef85c8709fa7a2cb9f2bb1878f6f54941248c009ce4ebb810b82f5207765ddcc10c4a5b36d7389533668cc5b99a2f0d485a7a1c9b8e9d0460117c29eaf3e9837a5f3bcec9dbba683e9fafbcf41a1e174d1bb0dc254401520604edf174947b563055e28fa2fbfbb86dad50df2bc1ebb77a437b99b1c9026209786141fd3844d0fe0f569e0ac0ef1ebf9fe130ef84d0e043d18b7e08dc6f5b65eb2000fe9ff658b416637e75cf709123a9a2ccdc75cb44307bae9bc3d8286e289d81acd9f9c169d5a19176003bcbba5836692cebd522f58212f2f42d8679918d23f37a3ac84537ae7d47fe413bab870707107fa2b08fc025097ca518b587ff3fdad93f705db21c802709278c751cd10cee03262af781faa1e24f33aa87dc298d0ba1846b44d900c928e6f714cb8af25403a55b32795dadbe5b6bbb3d3fa24dbf23b56f5005f819e71f4dd4c58c931a642a06ff04364995bbcbedb59c18d3c3654ae61617317222fe91ce6da04f819ee85b4ccdfb751466746295fde1a8daae46b2f0c7293417e7bbfc8c1477a01a89e4834d54b7c918aac7625f486189e3f8c91bca7ba52cf11e95cdd58be7cbdebc439211c7d0d697ff5e6f9f1eb2d7a6095afcfa7d847c4115edd91dbba87bafe034c27a8d14ce577fdcc91aa5bebac86fa580058697a4143d87fc3f343cb0a28770de2250b985319beced554efe7045fa3ffb2f4c5b4f01beeb53bb1904a3e79c9b66502ba28a7a69bcec9833b2cfd2a99ba26e5b181d55a3ff747de24fab803a89786602725ad3f3de11257e53e6aee90caeb4c649811c820f0e74af8b45f3914b2747d97642847800fdc76b94705885461fd92ee4b84d589e1852f7a016459db620635f0d0c8ac3577a925b429c07924717bd54345941e562becddcc52a3e1e04c378ba6148316042261917a314a47aab60bd3848914", 0x1000, 0x6}], 0x1020, &(0x7f0000001240)={[{}, {'jfs\x00'}, {'\x92^{)$'}, {'.*'}, {'jfs\x00'}, {'[*'}, {',{'}, {'}:\'(\xf1@{[&}&/='}, {'!{'}, {'jfs\x00'}], [{@obj_role={'obj_role', 0x3d, 'jfs\x00'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@dont_appraise}, {@seclabel}, {@obj_user}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@uid_eq={'uid', 0x3d, 0xee01}}]}) unlink(&(0x7f0000000080)='./file0\x00') 23:33:39 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 993.604396] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 993.604396] [ 993.676376] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 993.676376] 23:33:39 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000230c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x5, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000080)={[], [{@context={'context', 0x3d, 'staff_u'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'staff_u'}}]}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x4240a2a0) openat(r0, &(0x7f0000000040)='./file0\x00', 0x440000, 0x1) [ 993.746805] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 993.746805] [ 994.127625] ieee802154 phy0 wpan0: encryption failed: -22 [ 994.133259] ieee802154 phy1 wpan1: encryption failed: -22 23:33:42 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) gettid() rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) 23:33:42 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000040001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:42 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:42 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600007a000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:42 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010003f0c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:42 executing program 0: r0 = socket$l2tp(0x2, 0x2, 0x73) dup3(0xffffffffffffffff, r0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r2, 0x0, 0x30009, 0x0) fcntl$setstatus(r2, 0x4, 0x800) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) 23:33:42 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x0, 0x0, 0xf, 0x1, [], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:42 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x3, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 996.435175] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 996.435175] [ 996.447557] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 996.447557] 23:33:42 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x3, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:42 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x3, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:42 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x3, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:42 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000400c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 996.603774] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 996.603774] [ 996.629313] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 996.629313] 23:33:45 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) gettid() rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) 23:33:45 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x3, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:45 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600c0ed000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:45 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000fff001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:45 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001002820c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:45 executing program 0: fstat(0xffffffffffffffff, &(0x7f0000000080)) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000000), 0x101000, 0x0) ioctl$DRM_IOCTL_ADD_CTX(r0, 0xc0086420, &(0x7f0000000040)) 23:33:45 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000080)=ANY=[@ANYRES64=0x0, @ANYRESHEX]) [ 999.460584] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 999.460584] 23:33:45 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) setxattr$trusted_overlay_nlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140)={'L+', 0x7fff}, 0x16, 0x2) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x4240a2a0) openat(r0, &(0x7f0000000180)='./file0\x00', 0x200, 0xc1) 23:33:45 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x3, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 999.525496] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 999.525496] 23:33:45 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100fff0c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:45 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:45 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 999.684410] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 999.684410] [ 999.697373] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 999.697373] 23:33:48 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x0, &(0x7f0000000040)) 23:33:48 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:48 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000002f00000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:48 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600fff0000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:48 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000020c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:48 executing program 0: r0 = syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) r1 = accept4$vsock_stream(0xffffffffffffffff, &(0x7f0000000080)={0x28, 0x0, 0xffffffff, @local}, 0x10, 0x0) openat(r0, &(0x7f0000003080)='./file0\x00', 0x20000, 0x11a) sendmmsg(r1, &(0x7f00000036c0)=[{{&(0x7f0000000140)=@can, 0x80, &(0x7f0000000600)=[{&(0x7f0000000240)="9e8a77c874b1f1680f74f42b1a79c464a88bfcc58019d7b7f4152eb90fecd5123d4d266fd0e1b9f5ae644b9790e5ce1cc6322519ab5d6a2d48a1b0c5d40a79bee7bf72d28938af61aaee731f4e5911dde1f48e9415ce848ed09cab1b0934c60fb0531ed8a0025e4f4c95c6a0b2f2b3eb1d701628527b9d95be6f8df07dad0f678c4cdf363b73ed79ce82a05c73e998227da5ac447d2b38ffb852706cd879a8839edb07", 0xa3}, {&(0x7f0000000300)="f2a0697b4a271041cc4d0021be35f78715851802d124745f0e0284f3b102664634f4d83b1534fae818f0f3f579ed4a8c0d44008641bfd3fbc99972e6296b57d8b7c6f1ecbec3670b296e8a09707b7b53b75f525565563947283c820eeb3cce6ceb317271ea75cc4af578ba8010135e227336d9d5", 0x74}, {&(0x7f0000000380)="ee1193b0c647f07ec7f6dc10a3fb9effe4c7edf5aac783be1aab07a69af46a4fb7746f712692e62bdc591b544e1846c49a0e5f1b3be10cdf61463fda916912b290e41223ec1e3935f3b09d6310ec75c2f561b4895a36cda8de117c649c65f6df485f86b9e306e466e73d375e90c54d997bf36f379316bf68059a51199e91d4c307d6d79bdf6f49152321460b2d7b6b7fc0461e03bd4bb53f3f5f26", 0x9b}, {&(0x7f0000000440)="39e2b0ef87bc4271dcf22336829d44ee2d1d2a111477ba01b0748c0a2b7fc28517ebc4fd9ff4e65483b67b87c9c3d60721c6126338d6addedc383a4e464f6090aff75149327441a367b0c57f7b07a0cc164c29db46b6f96d397893635274726db44a83634e36fd064486558d742c65a190b563cca490a40143edbb05a080fef64688914c76ae74bc78125ab9a34ee67ee2c537e43e34add9d9a2a341233089481fa3b5", 0xa3}, {&(0x7f0000000500)="930356bed0c955b3cfbd838b76f48c9e20b29f530caaa4b291c9fc6297089f01b0ca06af62d3bfe0af34f6dcae6425b9defdb142d01486d80f559957123adb2fa966a0f7176644408dbedf2ed4e4b8cc2973841799b1f1e2b64984a045d0f6722195ecb89d8eabbc9e13562c959b0df8d36bc35890b8f5f12a356bda2d919e6056f13c246206d9ae201ef90083e67a45a02bd2aeef7b401c3342e09b6e960113dd03e7512bdbb8c19a88a1f0c39f4a5332769beec64b977ed9c540755b2c603967fbd37fad873c8d8aa6679c62745744b0eb50d194998dfb6e24748c7efd3e8aba10581ba581f78c3fc2", 0xea}], 0x5, &(0x7f0000000680)=[{0x20, 0x102, 0x7, "f9b33db729ee73674d20ea"}, {0x60, 0x19b, 0xa3c, "ea58729d0aa553e511306649e9bb48ae30c9e02984fd4ac93388215a697a5ad51983ad511dd64c4cc5288e9ceb69d4f1561a346571551611b645013d5641d6a99f707012e708a5eb63a977c8"}, {0x70, 0x10e, 0x6, "51a9ee3ecaca19f3482195f39e8c1c54f1feb7d1ab95c81785b678cee7ce9cc83276165942beb41f783ff4e200d75b8159b5e940f6cf36866d979fc1a0e18d99be5e934227b052b32b64d36b52e04b5b8cc50f69be2448e8dc"}], 0xf0}}, {{&(0x7f0000000780)=@sco={0x1f, @none}, 0x80, &(0x7f00000001c0)=[{&(0x7f00000000c0)="70608ad907ff13a1922c9a02683e9833a2cc585e5c6302", 0x17}, {&(0x7f0000000800)="efb6d3ec689748936aebd0581deeb9b09be474182285a0fd4a45c1acc5ca8ae105342a60bb59633ba9e1492601ce4999cde764f6323f2eb706a63308ccdd9fbc3e419a495429ffec6bea6ab93ff4b95a2da03271074146e3dafeb861d9b7dfba91905184252568cccfbf1bf31d10f9cf72115be91a677415cb930a10932c2be7659f8528578ab6", 0x87}, {&(0x7f00000008c0)="e9a6cacb8ea282a2fb091caf9ea09e8afaa27c1872a102b1d633eeb0faa1c01ba026db50d0e121aacc7298160e71a903f5ac361f22b7e58f27abcd3901d9a7c0193cb61c3f0671d800ba544b4be0b65b0e523ebb0001eded442ff78967fa7619391212d8e10ffc25d0fa0c773b", 0x6d}, {&(0x7f0000000940)="87271d0ca21512144809696be29147987a90a5e22a591df0cab0ef50e8736e23ac6be0bfdf7d4fe538a78fbd736648e2c39b71053fe60d656d915c8ed910c3e66ed4cd696bab0d252b14e28311c25093a1a12d41691eb97ccc5559ad44a46e6277a97c9d", 0x64}], 0x4, &(0x7f00000009c0)=[{0x1010, 0x1, 0x9, "6b9e90e0cd2ef8dd726ecd6af6a0845336f2327a92fd6b3e56907ce1a61d6ebf57fbec9ec8f10af26b3987f0009fddb597d694acb82780ecc43da4d1f80a19e4d0bcffc5c4bed9fe23f8173f968c2af0927df584365377c0dd29dd184bc8ead99f4ca78f359eed34120e76b0c910bcc2e869c19642ffca2aa9a9921515faa9a330e831598c1e42de43e6c835fcc28d9ef08be1bfb0acc558471065b9fa8886dcc71b000d7a70936efdf3aa61b2c7cd06122f66830ce7b7af2944327798c6224e113e4c11bfc8ab72feb6f97c97af30be30a15470c656b180a8a9ccef63eacae582765f9505ae7664c447844f6920adf7a43117c859d48d6835eda240af8f3fba9498354ee14fd01d42d6013d58565f93bc352972e502585998ccd20813d8eaaa55053ccb487a61627196be33e74c50778b349ba8dc0a8c54479438745cea0997f48c8fefda585af2f3068487acf7c27abd879bba5754105d244861e30f55a81e0ea376c5f748af60db459ef3e3dfd2fb6dcb778ff4d424158b9cc42cd236f9628db4f86419e4fbd446594733b49ff54b20485bd35c3ef575ccf4e16af61863b47a405bc2e05a7838f05e1ed662fd7d3313e63db7f209983f3c36f4830973e10abc2e6f6df4e5e771037490132ef4d4758dcd3f4effac0dda6a881df3f2b1e843d10883646dec26ac8c1fe5a056c771f1038e1875a71af67fce302a1697029b3d9c875c71e64a9f3e5885d516afd23caa9b5478b39ec78877ad004968853a1afa05c2750f804b70e9b527a5e3ccf946be78be70e8d96da57644f5a780847bedf2a4cc9eb96259d6e2aef4d9dce2bf61b31392d2fb4adf78ab533313952592ee2e194e6869e8503282ccf1b3588493a9df10401e09c3628606f057264411529e2af7596a4080ffc78f4f138dc5ccafeb90392161b08b99d1bf12eb2b403dcd84c508200e2091353c186de43377f72009f53170c49115571b5661ce766a9e4dd71c7fba757355e03eaa4db3e7bd93c635c9747ec5b26cbf0f911b9689a60ed797055ebf26cc6c418b50c133bd1ab68050d9cfb2c7331132456dbdf2d9df28dda4380c039c92e53b89f3727892dcde6408ad6d030b69589df9c8828afd6edcd1214ee9e866377b493a862da77ce117b6f94a9b5a323c6532cc1893821709cd96dec834d75476964fd26abec94511a132729124bc95f78eefc20ccf5035896c227af64c49e0b44a1afdbb8155706beb8426ab6442c14e6b41aacb4e9efac6306f3efee44d0c668325c5f89caf8b0e9062c92a5f9302474b0d530e248788e9afd646e01dc9103b08e58bc5c69672d7370047424da4da6674a2936061cec743cd9f3e1799a835bcd9c4b8f69bffc25a4a714944e8f74a6a477af5ca4712dfbaf38c29c27e6ce3de97689356eb63c93d450322b74eb992830a62b65845a29db3331935ca192b74a88d896b36cbdcc83cdda510b71e4aba8f9c7e7bc52967fb9b4fbf6fc5dcdc70004e400ffd3c129e2b62b147af1b283665e48924a40e4b9a6f9300faca521fbea0298cde583878226ed13f87e1574d4cfb908ccea09ae8dfdc133c700f19812d7b412d2d1a91a567e45ba8cc154bc4fc7e7cd292aabbcbbdf6a6057e2c6dd9514199db2b5ff3f482c6c0762db6bd5535e6d4289b0aee442f0f897d546ef7fd4d64a122ef0103fe646aa811895a72f0c45b1a8191dff8d92c986a262f6091b60dc3b7a7245f5214274cd6777f4f58b7b1f81f60caa84ec243d3ade89b419d5338ca690e0a45ded4d7ac6adf1d62e4df1d6e776827a64116a3070bcac92bd85dd924b9477a243c781a94d43c0e663adebc8a00a8e0cc044247678ab4c28f7294bd106fdb28c87811248f628589e344a18eddbf5ed22a93c6b8ac02fab7a56e42f5a3a76fdae6d7cb6650efe3d9ca7c1952cfd26ef99b4b12584b4b757794e5f3e03237197f41182cc5bd411ceadd1224ea86193bf6afa58f1344b67df7b5feb1fb78c8b659c05138add5ad9f4f1a86a016b77366f3bee20afd4f5c9f3f628e11cbcb35a69259d33355d141fc0f792a8cf5db53632ebf523887d18c2208d5a353a40f75173c12346845181c90d193a352047904617373fe4cda57bb1576639d651d341de4596758dad0d4357713fbd49f9b83d8bc1d2ecc66bd8782b1c03b2cf51b2654032ded3db4eddb07520d17cfb2c44ec64ca8dbf303bce7341354a80f6f9a964fb89f7cccc79d91d9d3f9ab87bdfe058a64a56fdb58cb181c8b470750277f254553b5bd8d5c04feb025b2055e01c5ff055dc71f89757f996a24adf3f5f1c2e0593da4c577144e35f15b2d96df9f837db1b2dfa9a814c8147cb0e1c7ba822439c6283832c143ba76f5fd2c12de3417e001ed5a670beca840d5a86aa23945403f4352bf2c360579cf8ee48097afdb0d5b5704472c41b210690eb20b28fa58083709807dc064b91ce27a59385399a0d220e208c2f8def25eeb1d9abc3f6df5949e5430c1666880129bcde9cb33b8d24bf25db9ee48ab88e95a518ae50af921043ca5c8be212c31d165990b0b332bf15036a7e6e225c7694c570236b39ecddd767bf6ebacfaf01a50925fb363ac5fc068b9f71961ee3e109b4a7a751496febf88681495a98443b30435f73aee2ce76d96f78e6df9f6d331630fc97a508a6338267e477f820398a40a54d6798be7d1b27bc289390aa908be7bd8eab3eba02a9db0f258d97b58bacda42a9a05942568495fe3989852cbf97af0bd70ada29b54d3d7be50dbd43233723d9723ae72e7bc8b1413ae3ded0a3e8e50c4450679668b900e4575d7455f59076f5185f98f1d4ce5de2172ff30234f77fdd360710f360595189ad63bc814308bc70b8b6db443df84ac080448eea37166d06f3a0d4c5945839d8099ef12c27c01592b5661041097eefc579fd487105ab3025e88a2e1af86cf00c64ee3f8178e0c8168e8d4ca56f0d2567bdd695eab47ca710ba7d51700117df5869e5181b9c80fe4d1c18d70e8369942602432c376ea013a86e7b7751a210393eafbbb5b36abc10d6b62d691203d2787eccbef5b7607548c3f672a219a576c49ca7a28b6d771a55054ace35f725d29a33a57fe4956b086e5c0b5e10de44ce86ea5374d55e027fd78a0e222b3019d19d3dc1b18fb5da7b20ba7bcd1a167d87e6c6e515202651e8dc44120739c59050e0dbff85580ee74211bec0267c049a0711fa449aa32f26709edf3d08d83ed6b1c761a8831a3d301d8cc9db4f510ed8820c3f05ac37425a9ea355f54bba5fb3452dff584e01c54748c6a68dd628aff689f2606d81d94ebc977967cb7c1f57b5058f0e3ce11dbd70aecf89f03a513384c8570aaab9ed0c72b59653ff57308d0d25c6f523f8d992d41b26a365ca697690a3bd6e828e253f0a8bc67d492f3eaa00b71393ad1dde122a0f8180fa215745efdb3a37dd778ea4b9057e6ebf3cad7805bc02540e4db16f5e70cefcacac17a5d31e591b7cf01828d0ab5bcdcfba40ef551e3e0fd12314429118b0c411b33ad1639c3981a5c9e1b9301b206e22048b973195440f5a85cfc0a249a65aef50b13c7f6b600659873ad3bbb184bb5f2978d2992ff55b73d9c762b6c57c75ea07229d8c142dac6f65c63d6463f70f04b26ddcc799c33722d48ceb3b4f9ae7a65cd21308c429855ccca3f765be4def0616d7fd6e447c198050940e363c74af7eec6f7fb1169f3c71e96250c62d2f8830db8e8f3bcf98d75f39a42412dfcc99f4d41cd4e5470dd0842524f152e9bdec19760b72e58079376bcaff3ada4ab1aef7673a271700c38881dc9f56f2f216101e46c6c6530532e80e73623311602638ec00acae9fd5046c4926694df04ccddb0573aaab1f77346b6e993776d8e443ca39470bf2ff9e4cddbb86d67efea1ff66f17ac53ea3ec1b0640ab81423e78df16e0d42e210df621fba1d5e336db074ef1291547d71f199f05764e2ca5ec1a0d90197007bda1101a48c04937c9e28e5f8a9815474c6f1941ff6def1b90b8952e72dc1ed8db54ae50b84c430adec40793bceed0226273f990190aa4db9b39777d1e15821b71f4803eb0b4338fba7ed50ba1a8471b4631787837bf8c26a27e52e6fac791da670137fe9e73968c0eb2b625b1d5af23d01a0336662e85fa7c3a29903bb23215f20ce7e0d6b94509abc243b28d2b06ceff2ca60ef0699f9a0005c27c064a6f7a4b8eaa1fdd91fb7fd4e8b7c425902c9da9d466da286512b93d6916f023a57efa4b4ecce5c6e993d842029f619ce967f11caa1331f9fb99a8f07e8032f99848c0b519de13f88dcf404a57bce78e438e5c23ed105a3039634531b7a9f3eb9d30bb2af578251c058e66fd4137d7dd4a6a5f5ccbdf1feb6bd49bd8e29352613dd2e6bae8a8aae7c95fa84bbbd903408757b60a70a8bdab3e0c13bd286a62731da01c91ddd40ff9a04578874cce32dc378e54a4a1f9dbb29a7ba6367ffb4af5b8dad4975a5f24d7ad85c98b067551fbad356e91f0d46f2172f071b74e5daddc1eb7c23c9443888332c28d502a880896429a2f844678f171374d533fd846e321699a867005bbe280e9dbf0503d255abcd1c8eea61b27717f17461f92b4b551c8f9acf172e0d2375e4d9a041c1716f309a9a0f1efcbb7f44181e8ceb29cb44e68f4239f181d7d9bb3c68ae0abe2949041306f1f13ba4cb6226beff261ba7df5c39ee03cec08e18c9356a2b1458e7585096f37dbcaa239d393b54d053fe195020124565d5efb18bccb7242539a7ae20a43ebf3118a96f3aefb935a91e6b49affe424a588b400a2946f812142eeb4675b8b9865873bab7cd97637ccfb54915a5e5c5c3f3bf5c4bc429c0bc24588b4cf85d31b001743b09c5e92c6c916821034e82e1a8600c340518cbb748ddf45cee21a9cbc311a3626346c93280e5dc6c7a7961e186e0c24047539a5a4b707c204e3e89b7884d0b7f87df3a21d008e7eb32410124ebc2fefee09b5f5059344d258ea6727782d7d0b86273855e438063e35a742b53bcfa2fec7ac9ebd868b9491064f31697fc322bbbe2c7e0553609af66e6eaadaa0aaba9dbdda2a581debc4eb297e9385e02c9a0142d319f1b61fd02a5c8ea92a7859731a9797f0cd379d9f07df4331fb79256307622d02a8552b32d21abddb929caca82b68baec2ccae394e9939c29337270c965d46ae2ddd2d652fa98b852e8cc43907cb3d088ef049eca4c9c792798b6bb9c07d4e4a7be60979b282c1730b3b5f1baffec6b8427e27f04d26b13756f85c090816c0e0cbac7884af7b03155383cd8d2f80a262e0cd8a095aa850a73cdac7d12ae1dd037c4214aed77cd4fe9a1665d1c3b172d55a127d69b94e4151fcd47ad4e20b44d2b38e5874a933006b675df3a5a115f1eba6b28718830c64e4d954f6b43e967c91dc60ae9cb6cd7f9709b03f633287790ad57e143c0d81bb91b8ca38f50c5b53f4931ae2d8e89a07b479d32d1af8ad38a31578bba3be7315f8842cb6a393ec28bd972b606402bcc1dac362f083d80750dd0d93345c72566aaff0bf1abb062782edd581ccd554f67996fb823af6cd247510e3970841be1701db1c220981e42a697744e3c19deabe1ae8a5bff140a872081b029f0c422161a265b1cb6d78c41f39b6727727455c96d5b07aa050e849134006d9ddc0a76ff5f1bbcedadc4047e64e3ac55d9c3f526f4e356c00cd872e76a607c339666d3a2474322f4a18da0dcd775b02c6a4e68abc9cc332a5358709e8231089fb6c4cd19754a9362b6f9608045cba1d27986385fd85c6c66035b9f586"}], 0x1010}}, {{&(0x7f0000001a00)=@hci={0x1f, 0x0, 0x1}, 0x80, &(0x7f0000001c40)=[{&(0x7f0000001a80)="2ba687fb273fc3bdb5a38d37f3ecf7b245ec4e2ffd76417a2bfbabfed25b21be0159f91f8619e8404c4027e5900eb51396ffe4a97566afd871bf941c3ebace3132449de4c25941185afb6ac497e4ca286eb43e1b87ecdfb1f5fe4cda0bfa55142b45940ae786019382a1ba3a2a5da9754abdbcb21adef1399f371521b7ca4333a154533963cc3e5c8e7c96ef2f4fcdfc8220b076df965869e7a1ade64590c16ee30743ef50fa7b20479313e30b85efdd2b0f49", 0xb3}, {&(0x7f0000001b40)="02c8c1d7ba8e047cc121eeccb319effb97806e8f65c7d9d486b9", 0x1a}, {&(0x7f0000001b80)="f10d3cf4f3bc8fae3e9dc9c8efbc027f1bc8d4ada82d03b89e17ab663c88a730f20cd6a5c2a08d31609bd389655901d6a8a79103a61fb463c1fc558fc1c6a90f404a6891c0923077704238bfab419d61f763fde1a8d71ea14c14c446c87088727c2bebfec19543f5657b0da09273449c9a77f4feb988b123c6a4b8c5a4af4780aa657eeaf9e293f07620ebd95d42518d26b58fa0588423194488439d6b8de6e8537efc7f86c039454e27531b40a0aa22be6edcb9b49b90", 0xb7}], 0x3, &(0x7f0000001c80)=[{0x90, 0x110, 0x9, "2e1ca9379d17b13da37d4ef5056c582c54eb21987a0bbaa0a505ec48010751d697425115f80d74fc34c0ecad34ff2302a787b21863010d97c3c0fa0fd47a9161494bdb072ae6128af830016e1388e2ed6e930c77f851ded0a2cd7ca9ef11b9907c820944008565e62c9a25e783625a0c12c36e145fd641da4c9ec06e"}, {0xa8, 0x10f, 0xf67, "886a909afce62cc465c8b78158654849a7adea338fb7a718d447b5a951707e64ef09ecf87ab1b1c421cbfceaec65248cba446f59a083fc4d4a86fc06800b6cf14a3642a8ea293ba09c70cae463179d1e4a90808a9df609cb543022eca0a9019fc586066f6d663dcbc7e71fd65cdd66b140855497251eb42b7330acf9a8f839da9463ba731ed0e6d72a876dcf81e1d9ab58bc"}, {0xb8, 0x10e, 0x2, "7560cfcbea9af7308808e45839fc8b4055b7ea47f27c9ec713f05da1de9cd3cf2d44403818133373a1b8eeefc5e2ca367ab40e0d19e1774eaae14cd41041f2bc88124cb3a9106cfaea8cd9d80f96ed50857542113be466f09d6422cdea7dfc19dc9762c81952d95d0c649b32c257fe6746152d8abb3f5c9dd6f1d9e8531406554a2155044c26c9b2073c60d51c8ce6cd55b7ad060c1ffbf8ce1f735151532b97be76ca"}, {0xc0, 0x0, 0xfffffffd, "48f95c10cd329b59778c117be9ced114e00c1c23c3dfbcac88e3887f9fe1eaf57c36b0e67172283803325a6b28d30ebd4d9be3fc70daf6dd1fcb8c23d73cdc97f750b16e9ce822150d1ff209cac96a1bfd8dba5b3f1bfce5e31e0c91a48f456c7c84e613cc5cb2d3ee752d078fa4927f4ab39370f88bf1143b0da4cca5f832998afdd7d694060ec9d9c3411ee70a99fd7fe2e8b7588c5b0ee6e4a6d73538f6a8bcfe7629b752a0f212734bc0241c"}, {0x28, 0x102, 0x0, "9f0caa8002e0fd26745b23c2292653ef6dade70d"}, {0x68, 0x84, 0x8, "e480c45f6df5ca0c58331ac32281f516da6b97b8e2df618c6c323be4482bf3a35d53da3137bf66b301d898c3693efca2b833afd71c539120d76d0ca2559d2bf374733d404e9688953872656d6a8da6df179b"}], 0x340}}, {{&(0x7f0000001fc0)=@l2tp6={0xa, 0x0, 0x3ff, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x7f, 0x3}, 0x80, &(0x7f00000032c0)=[{&(0x7f0000002040)="c04f897122c3d99d775c1d5fe61f64bef7482daa663934ff61a558798aac7d708015155df8bf68581c2ee8b292e2b8425bdc6bd2578c", 0x36}, {&(0x7f0000002080)="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", 0x1000}, {&(0x7f00000037c0)="91142dfa8404395f238e1be6eec58b7aa20ce417c534f50354db5bf48c81992a21dd73d4f310c5c2a10ddd0609d58da0b970428d3c92768121d1fe456c5cb5a2b700418449633f18742d8bcd339407434ff700de2952e782c2ea0a1870095cc80fe3cecc08e48172c8782333c5093d8d7329d2e21506c020e3f3453aeab4a567c1e2391e9b0b5560da1fcda738a8169a3313c62cac16cebd19c5f6a5ffb3337836fd06938ee9c53631d1c4cf687b1b7a457e670399e7fc65febb037d8aa5c49c4071b76c2d8985448c71f59d315d941e25a83a6373a194389a19627d0a2b1c9e87fdf1145864b0463bb5e0c2f2df059c", 0xf0}, {&(0x7f0000003180)="353019117b03c73d75dbb7c333486026ed8c81e496fd6154e85ff76eadaef7c3fb5ca4307b4293c23585efd8b3e0c8474f032b98562a8128803fe792eafe4bff2f613fcca9a2b1a1b021759c5a175cef1b2a3c7483cbc6cd61f7bcf08112acdae5260c21ab4ad61aef7d8af47309340bb46ff6ef472e3ad068d0e69f5c4568", 0x7f}, {&(0x7f0000003200)="aa4ba893f2f4faed69bbfd8ebef404b9aeb4ee3394", 0x15}, {&(0x7f0000003240)="41e119479a67be7e3260737d1d96c98415123417b87422e9bc70a6b6f121bd994914fd5a6a9105a009f694b96aa9e7c678fc8544f3c8caa9544659387bd29b40412180a7d119c79986f2c8514f1e5ff12928715ddd5fa335", 0x58}], 0x6, &(0x7f0000003340)=[{0x48, 0x5b2715aa25dd7943, 0x0, "d38a935ea55bdff6304dffaab0c230d10c499a28dd3e372b1ea3cda2e25f939b05ee59cfb6baf0d9bd60de2ed9ad3f82daae01d2"}, {0xb0, 0x84, 0x0, "8136f85a164e870b6ae9f73e813d85fe12fa30d12376ed38af5c5326e9fc6d44fc528a9ca008b05371fa70c880431fad829540a65ee9606c443965bd09b40904967fed4bd0e965f94323892f5ce96a11c139b93d1fbfdb6dedb671f8fecf7b0a756dd14c31962f30d5bf32d9a0bf0ee3991a891eb021bd4bd5a008eaca5d8b59622b17979e75d13e3291c00991c7f61124e0293799ea227cbe0c"}, {0xd8, 0x104, 0x800, "6a742a4d7db6bccce81ef7570808c45bd64f47dd7063d6893a66187c24dc8cb1baffb67ac62a08ae3910e30553721ce254fb4661ce5a923cc2f8d2e8bd3d21a367985882b82e0021c80e227e280db37bfecd461fcaba3161422123287965013d87683b7699c802a0c0a08d5d79772821ec4651d34f582778b2cd5b7a593c03031adcafd7fc9a42f88dbce55fc73d4ffc81bc24c54c3b140b8e5cdfa20a6e437c55100c38e99e5e8c850f9e582219736cd521d15dec776d0b000000000000000000"}, {0x58, 0x108, 0x30000000, "f46e44bd426895abbbf8685451ff629637cc069464196d6d6128d9786752578c0dd94c4436cb0fb000d78bd8ac01942ea31a8f8c8558a8bf81e10efe32fff07cca9e6ee834"}, {0x110, 0x107, 0x3f, "47f3c72aaa5301fc94e990f16dbe411a3f072173b895f65ba2c52f774c6efb7603ba37c87e7bb8c4c9dc6e95e726711f1b0ca3d51d4c96802e4cbc643456b0476072019b7d7822cae26bebc15342f508bb6c58d6ddc3776dc965e12472f33071138edf7bbe935919676be5ff533c934bd347dfdbdd200e342e860125f14f35285b0f62e0833260cef147b3930ef3debade8bd607eba51c03ce47f4418e4f40de5c5f8b973be263c4411e87b86828ab6dfef527c17cad6c640dd7f109332535ec5358a52987a2fb68c4ad7159e87e50e208b56c8da83df79cbd12448a288c10c92c9928b1238181a9ffa706e2216e667ad4b1bebc5b18da9821"}], 0x338}}], 0x4, 0x0) 23:33:48 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:48 executing program 0: pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x0) ioctl$IOCTL_VMCI_CTX_ADD_NOTIFICATION(r0, 0x7af, &(0x7f0000000040)={@host, 0x3}) [ 1002.512827] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1002.512827] 23:33:48 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:48 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:48 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000bf00000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1002.695681] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1002.695681] 23:33:48 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000fff000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1002.874580] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1002.874580] [ 1002.977071] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1002.977071] 23:33:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x0, &(0x7f0000000040)) 23:33:51 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000030c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:51 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:51 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)=ANY=[]) r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) preadv(r0, &(0x7f00000005c0)=[{&(0x7f0000000240)=""/218, 0xda}, {&(0x7f0000000340)=""/239, 0xef}, {&(0x7f0000000080)=""/107, 0x6b}, {&(0x7f0000000440)=""/248, 0xf8}, {&(0x7f0000000140)=""/115, 0x73}, {&(0x7f0000000540)=""/118, 0x76}], 0x6, 0x9, 0x7) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x8923, &(0x7f0000000680)='lo\x00\x96o8\x0fd\xa1\xe3\xd7]b}\x1f\xa1Y\xad4\x90\x9d`\xd2\x98\x00\x00\x00 \'Y\x17]\x15c\xcaR\xdd\x98OC\x89\x1b\xe7\x84\xe2\x05\x80w\xd2|D\x8dK\x14Bx\xcbuH\xc2\xeec\xbf<>Y\x1a\xfc\x1f9OB\x81\x89\x186\xc5q@n\xb4\xb6s\xb0\x00\x00\x00\x00\x00\b\x00\x00\xda\xef\xecE\xec\xd5I\xb2\x9b\xfe\x8d\x90?\x00\xe9\xe4~g:\xc1\xb2aj\x96\xbb\xa7\xe2\xc0\xdc\xf9Q\b\xeb\x16\x7fT\x11\xd3\r7\xe6\"f\xcf\x8e\xabd\x0ftp\x82\xae\xd2\x15\x8e+c\xf6\xbf\xe14>\xa6-\xa5c\xde\xd7\xab\xea\x1f\xf8s2\x9cVF\xd5\x18\xfe\x0e\x8f \x01\x00\x00y.\xfc*\x82\xa5\xa1p5\xc8{\xf7\xef\xab\xe8\x99\xebw#\x8at\x1c\x80\xfc\xb0\x95\xa2\xa7\xd7,Y]E8\x83X\xf5F\xdc\x88-\xf5\xb0\xb5^\xdb\x1a\xb6\xaa\x14\xe2\xb9\rh^J-\xd1\xbaUn\x04\'l\x1b\xe0o\xdb\xc8\x91%\x1c\xb5\xbf\xb6\x90\xb4\xc2\x7f]/\xb3\xe7\xc9\'\x94\xcfIo\xdf\x04\x95\xb5\x06\x84\x1fH>\xda\xc5\x04 \x94\x88\xeb\'\xd4;6\x7f\xd9\x99-\x1b|G\x8d\xd4\xb9%\xaaQ\xa0K\x10\x03\x93\xe1\xcc\xe7m\x80\'\xf0\xa5\xed(\r\xa8\x0f&\xb1\xf3\xff0\f\x82%_\x92\x8bD\xb9\xd9\xe7\xf2\xe4\xc1i#\xdc\x87A\xb9\xc7\r\x92\xfa\x11\x11\xb5\x1f\x03\x9d\xdd\x1bj\xdf\xacg\xe3\xa0S\xd3\x8a\xe1n\x97\xea\xf5\xa0\'\v\xe9\xa0\xf1 f\xaan\xcf\xb5i\xb6d\xbc\x92\v\xd58\x16\b\xb3_:\xa4!\ny\xc4&\nWMM\xa8\xc4\v\x9f\x01o\xf4\xab&\xb6\x17\x02P\xc3!N\xa1\x86\"\xd7\x04\xf1\xc0!\xed\xff\xee$\xc89\x8cB0\xd1dD\xe0IP\x88\xa2\xf2Y\x9af$$\xf1\x81\x96\xf7P\xac\xca\x80:!\xb4\x94#\xcb^\x9f\'\x03\xe3\x93\xb9\x82\xbf\xcf\xc4\xe3\xf7\x03Oh\xf2r\xca\x8ff\xbb/\x9f*\xaf\x1a \xa5\xa0?%M\xa5\x86\x98\xfa4\'1\xc7\f<\xcc@\xe8\x8a\xac.\xde\xe4\xc7\xf5\x9ck\xa40!\xe9\x14$\xb3\x05m\xb5m\xed\ft\x93\xd8\xa3\x80\'Y\xb9\x05\xbbt|\xbe\xbcz\n\xf3\xf5p\xf8\x9f~\x1b\xd0\v\x1cQ') r3 = syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$NLBL_CIPSOV4_C_REMOVE(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYRESHEX, @ANYRES16=r3, @ANYBLOB="bd7004ffdbdfa06b000009000002149ae10100000001000000dd010001000000004000"/48, @ANYBLOB="e4b3fcdfaf28d2f54df080980ecba931899b8640680e3571ef9f074dae8564120ea7471c8734c4922298574f4a6257e44b155e19c37e446191e681261f8378af0cef84dce214261ca313fcce6833276cb1e4ba13668bbfeb3b5024ed222970f99e7b7ea5a4df5dfe03e1ddabb042e3695f67e387c26fa634b4d9bfda45b262ff431c6d56785cf7fed495c7f6bc172da0e3349c47edadc95de0995d0500000049c46e0d364800bdfa1bac1bbd842f1dbd4cf73f2a5311fa106c0c61b59bfa82276f2a1aadff1ad04e31a1ad41059976b940f5452f93e868863e967bd1ffb3e1515b9853f730d800a841d1cb0c79e8435815ff0f"], 0x3}, 0x1, 0x0, 0x0, 0x4}, 0x40025) sendmsg$NLBL_CIPSOV4_C_LIST(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000001980)=ANY=[@ANYBLOB="ba01000015e902e73ab82083271a85f76b140455e66e48f8ab6340fbf34259671d74010000000000000021964771a5daf364daf34a7bc1bdf18c4ba9d5f8199775863f84b171d71975672ce83820e109d40ac49511d4cb9a1fdb1d41f552acacdf08752840baf9b3248f853c3a0866b8c8db05c01d17468f1c570200000000010000001c4f47acc100a4918dfce089dd08d527ffcb2f6588d51a8e89ad3e61a114bd7bd354865812a0283fc8eee46cb7fd999c5bed57fa62b96cf1e1ffd3fd462a0354b2269bffb6fd8ffa67563905911ac7934dcf1863f7c6cdb3674521bb7b878c88a057ed339f9310f7db66cd1e19dce0a1b4d455511b70647dd7e8142f71bdfc69552f0883880ff0dccd51b95504d22279135b3d9486fefee05f71250da37f4f3f14f504e1c46cb6a2cbf6fc70aca58b97e76ed44000000000f3dfbfee8023f99be68e76782d479b9f7d26ddef0e6adae305bbaac8055180ccf555d429e58a7aba6df0291b88237fe41e711942095e8802e26a22675bcc54300094a1af5c7d574b4f04db9f71eddad711c00c24e90f8f90866300f81ca06d66f4b17915fef24a7a6b8e7c1e80d3b8dffff2c96c77a578875c793445ffb3ec7ca8696d288552e6008000008e4ceb77f51b14127fcc001cc3248744d462b43d48cba20ccc3d40be923594a7b65b737fb9983a45164b8f701996c7d1d0886f604d179149c2deb908000000e3006173372860f0c57226fba67d795b32fc319e249decc96657262da45daf55a12498f89cfc28bf46840aa258d959a42ee6a36ca09b6f0ef02956062cd8c26ca528b6ad3c47b0115544563560be31189351c2dbb153b503b95d9a1c14d6b47c56c8f73ecb7a2fb30987e875ee8d3db8313c2d5d44c52572d1d26bef337d124317d05f5ab8b73d8719e90bb9a4f37f52f4d6f329da7df5f4c9b3b56b40e7d91a84b639d42437fcd2f200dc2df0fdfe4c8354dce9d1d5565d70468ec03590129fd8e085124af8d0d77231b001d69c3ee47dc7473d35feb63a550254554ed34f8a9d1193cdd29151dbb497073d32dce253d3471845686f554727eaaa49c3c08e565beb8121056a6425bd11ec981056296f86f0b362cfaff3f6d1380d3b8781f4055dd2d2296ca388968eb1e1857ca2f9d21503e2afbe135ff6f1007335e654aab737fa30b53d5c1dfde1ff807812ae87330c2ddc7d87e693c0fee2061679f0ce1f79b1033ef81a5515a0edef3c4b46c0476714c6bafc2d21650228d6935c84c87fe1244e944675c2edc8df00080000a2d1b0927bea43230000000000000000bfb78b363b73c3b98fdd90944f50f975fa0b97259177a3d9bdca2785271eeac520b18b9686e43be64f202e861ee983", @ANYRES16=r3, @ANYRESDEC], 0x1d4}, 0x1, 0x0, 0x0, 0x4008000}, 0x2400c014) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f0000000580)={{}, 0x0, 0x12, @unused=[0x9, 0x0, 0x7f, 0x20], @devid}) ioctl$BTRFS_IOC_RESIZE(0xffffffffffffffff, 0x50009403, &(0x7f0000000040)={{}, {@val, @max}}) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, &(0x7f00000006c0)={0x0, 0x8, 0x3ff}) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write$binfmt_misc(r4, &(0x7f0000000040)=ANY=[], 0x4240a2a0) ioctl$BTRFS_IOC_QGROUP_LIMIT(r4, 0x8030942b, &(0x7f0000000640)={0x40, {0x14, 0xa4b, 0x1000, 0xe008409, 0x2}}) splice(r1, 0x0, r2, 0x0, 0x30009, 0x0) ioctl$BTRFS_IOC_SUBVOL_GETFLAGS(r1, 0x80089419, &(0x7f00000001c0)) 23:33:51 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004000000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600f0ff000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:51 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:51 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {0x0}], 0x3, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:51 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000008000000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:51 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000040c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1005.591783] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1005.591783] 23:33:51 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:51 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 1005.771904] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1005.771904] 23:33:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000020000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:54 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:54 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000050c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:54 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000018860100000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:54 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x0, &(0x7f0000000040)) 23:33:54 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x4240a2a0) ioctl$KVM_RUN(r0, 0xae80, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000002e00)=ANY=[@ANYBLOB="00e17dad2c09bf9a91e2bcad37415a563b202534d007c19a68a1d9e32d3b00432e70277a6bc8a2585fa45d079ce562432f02522a1dec9b33e0a53c8e08eb44d5cfd90fd91bc0"]) recvmmsg(0xffffffffffffffff, &(0x7f0000004180)=[{{&(0x7f0000000080)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, 0x80, &(0x7f0000000140)=[{&(0x7f0000000240)=""/197, 0xc5}], 0x1, &(0x7f0000000180)=""/123, 0x7b}, 0x4}, {{&(0x7f0000000340)=@ieee802154={0x24, @short}, 0x80, &(0x7f0000000500)=[{&(0x7f00000003c0)=""/241, 0xf1}, {&(0x7f00000004c0)=""/53, 0x35}], 0x2, &(0x7f0000000540)=""/55, 0x37}, 0x8}, {{&(0x7f0000000580)=@isdn, 0x80, &(0x7f0000001c40)=[{&(0x7f0000000600), 0x18}, {&(0x7f0000000640)=""/202, 0xca}, {&(0x7f0000000740)=""/224, 0xe0}, {&(0x7f0000000840)=""/155, 0x9b}, {&(0x7f0000000900)=""/186, 0xba}, {&(0x7f00000009c0)=""/115, 0x73}, {&(0x7f0000000a40)=""/4096, 0x1000}, {&(0x7f0000001a40)=""/247, 0xf7}, {&(0x7f0000001b40)=""/220, 0xdc}], 0x9, &(0x7f0000001d00)=""/4086, 0xff6}, 0xffff}, {{&(0x7f0000002e80)=@x25, 0x80, &(0x7f0000004080)=[{&(0x7f0000002f00)=""/179, 0xb3}, {&(0x7f0000000040)=""/41, 0x29}, {&(0x7f0000002fc0)=""/4096, 0x1000}, {&(0x7f0000000600)=""/17, 0x11}, {&(0x7f0000003fc0)=""/112, 0x70}, {&(0x7f0000004040)=""/18, 0x12}], 0x6, &(0x7f0000004100)=""/97, 0x61}, 0x40}], 0x4, 0x10, &(0x7f0000002dc0)={0x0, 0x3938700}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000002d00)='./cgroup/syz1\x00', 0x200002, 0x0) mmap(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x200000e, 0x20010, r1, 0x44631000) 23:33:54 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:54 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:54 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:54 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 1008.678546] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1008.678546] 23:33:54 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000060c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:54 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000001c860100000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000040000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:55 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:55 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(0x0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 1009.001123] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1009.001123] [ 1009.068013] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1009.068013] [ 1011.282765] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1011.290199] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1011.298860] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1011.306422] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1011.314170] device bridge_slave_1 left promiscuous mode [ 1011.320589] bridge0: port 2(bridge_slave_1) entered disabled state [ 1011.330697] device bridge_slave_0 left promiscuous mode [ 1011.337068] bridge0: port 1(bridge_slave_0) entered disabled state [ 1011.347006] device veth1_macvtap left promiscuous mode [ 1011.352350] device veth0_macvtap left promiscuous mode [ 1011.358527] device veth1_vlan left promiscuous mode [ 1011.363586] device veth0_vlan left promiscuous mode 23:33:57 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, 0x0) 23:33:57 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:57 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000070c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:57 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000020860100000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000100000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:57 executing program 0: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x8d, 0x63100) ioctl$SNDRV_PCM_IOCTL_DROP(r0, 0x4143, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="00a979f20791281d159d0a070ff4b0041243abe778b8dae87d3df3c573e29674edc1dbb9893729f5c0293d0000"]) chmod(&(0x7f0000000080)='./file0\x00', 0x100) 23:33:57 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xaaaaaaaaaaaacac, &(0x7f0000000140)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000580)=ANY=[@ANYBLOB="00dcaf5ecd1c9a81c6c5780f0401e617ae4e4c440b3483db169be5fb62b00273d7fcccda62844fb309769614339148e7604a1ad50bbe602290e69928b415d94cd39ceb032be6b8f413abf76afed62d84126ed76394aeb70e5a28274eacddda6120ccdf507427679325ab5077ef1c5c7b3540d95d5554b3065061cd8eb58311ac44950ed7176761ea4ba8f6ccf6b6b05f795ce03a423ff929c5db1069d123961ee5131ba55bb782b439dea97103bf2e30fbe0f9fc5ee35700c0719692d62a4fa3eaa7d883719f71dd6543ac0f6b4da73694bc9f01721b4f5c3dd494b62075e1e856840921f5a2cade"]) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x10}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10) mmap(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0xc, 0x11, r1, 0x48525000) splice(r0, 0x0, r2, 0x0, 0x30009, 0x0) execveat(r0, &(0x7f0000000180)='./file0\x00', &(0x7f0000000300)=[&(0x7f00000001c0)='jfs\x00', &(0x7f0000000200)='jfs\x00', &(0x7f0000000240)='jfs\x00', &(0x7f0000000280)='jfs\x00', &(0x7f00000002c0)='jfs\x00'], &(0x7f0000000540)=[&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='\x00', &(0x7f00000003c0)=':/:\x00', &(0x7f0000000400)='\xab\x00', &(0x7f0000000440)='jfs\x00', &(0x7f0000000480)='[.()\x00', &(0x7f00000004c0)='$(@+\xf6^&^J@\x00', &(0x7f0000000500)='/{t!:\xf1\'{-/\\'], 0x1100) 23:33:57 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:33:57 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000024860100000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1011.730986] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1011.730986] 23:33:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000080c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600ffff1f0000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:33:58 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x0) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 1012.022976] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1012.022976] [ 1012.106834] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1012.106834] 23:34:00 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, 0x0) 23:34:00 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000d8860100000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000090c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:00 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:34:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000200000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:00 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="10"]) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', 0x191101, 0x0) mkdir(&(0x7f0000000080)='./file0\x00', 0x1c) 23:34:00 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:34:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = socket$bt_rfcomm(0x1f, 0x2, 0x3) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r1, r1, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="6f626a5f726f6c653d666f776e65723e2c636f6e746578743d73746166665f752c7375626a5f747970653d5b7b5c2c666f776e65723c444a382ddf41b03624fb14bc7f2e56cc14597c89c80fef437a456913b1bae9bfd7a25a2d7559fa171f13902ecd22a36294d16ba8c1ef1357233484b7f24e4fb3d9c82c15a771c04879abed7bad8de2785b", @ANYRESDEC=r1, @ANYBLOB=',permit_directio,\x00']) chroot(&(0x7f0000000080)='./file0\x00') 23:34:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000b0c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:01 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000e0860100000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1014.756384] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1014.756384] 23:34:01 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xffffffffffffffff, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:34:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000f0c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1014.948306] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1014.948306] [ 1017.282650] device hsr_slave_1 left promiscuous mode [ 1017.290862] device hsr_slave_0 left promiscuous mode [ 1017.310394] team0 (unregistering): Port device team_slave_1 removed [ 1017.321341] team0 (unregistering): Port device team_slave_0 removed [ 1017.333967] bond0 (unregistering): Releasing backup interface bond_slave_1 [ 1017.345057] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 1017.379634] bond0 (unregistering): Released all slaves 23:34:03 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x155}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, 0x0) 23:34:03 executing program 0: r0 = socket$inet6_sctp(0xa, 0x10000000005, 0x84) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX(r0, 0x84, 0x6e, &(0x7f00000000c0)=[@in={0x2, 0x0, @dev}], 0x10) getsockopt$inet_sctp6_SCTP_GET_ASSOC_ID_LIST(r0, 0x84, 0x1d, &(0x7f000095dff8)=ANY=[@ANYBLOB="c4000072", @ANYRES32=0x0], &(0x7f000095dffc)=0x8) r2 = socket(0xa, 0x1, 0x0) close(r2) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r0, 0x84, 0x66, &(0x7f0000000040)={r1}, &(0x7f0000000140)=0x8) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(r2, 0x84, 0x66, &(0x7f0000000000), &(0x7f0000000080)=0x8) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x9, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="4a465331010000006076000000000000001000000c00030000020000090000000020006fd834bf920ba822269527f7d042bcca00000920100000000000000000040000001805000002", 0x49, 0x100}], 0x60, &(0x7f0000000040)) ioctl$KVM_CREATE_DEVICE(0xffffffffffffffff, 0xc00caee0, &(0x7f0000000180)={0x6, 0xffffffffffffffff, 0x1}) ioctl$BTRFS_IOC_QUOTA_RESCAN_STATUS(r3, 0x8040942d, &(0x7f00000001c0)) 23:34:03 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:34:03 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000400000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:03 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000230c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:03 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000200000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1017.781191] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1017.781191] 23:34:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000d00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:04 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:34:04 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000600000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:04 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000002001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:04 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, 0x0, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 1018.001394] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1018.001394] 23:34:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000001400030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1018.106674] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1018.106674] [ 1018.117067] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1018.117067] [ 1018.286583] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1018.286583] 23:34:06 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x2, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), &(0x7f0000000140)={'U-', 0x3000000000000}, 0x16, 0x1) 23:34:06 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:34:06 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000003001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:06 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000001700030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:06 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600ffff800000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:06 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) io_setup(0x8, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000000240)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0, 0x0, 0x7fffffff}]) 23:34:07 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="137b8702ac07def2ed7ca791b7f200"]) 23:34:07 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 1020.791331] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1020.791331] [ 1020.819856] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1020.819856] 23:34:07 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xfffffffffffffffe, 0x0, &(0x7f0000000200), 0x1000c85, &(0x7f0000000080)={[{@iocharset={'iocharset', 0x3d, 'cp865'}}, {@discard_size={'discard', 0x3d, 0x7b}}]}) 23:34:07 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', 0x0}) 23:34:07 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000100001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:07 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, 0x0) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 1020.974760] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1020.974760] 23:34:07 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000003f00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:07 executing program 0: r0 = syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x2080003, &(0x7f0000000040)) bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00', 0x0, 0x8}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, r2, 0x0) syz_mount_image$pvfs2(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x1, 0x5, &(0x7f0000000440)=[{&(0x7f0000000240)="28c9751feda2efbe6948a9a5f653eafb225fba1cfbb71dcae1fa1243d4a0acf1614c1090702c5e1c60a014cd555171c8b58f768016839b9d9cc5bde4a8563a97e76266776efaaa98b180729e6f6c5d5435ebdf2b47fc47eea12df3e91eca12c9c3fcddb32d6931094839bbd89e1586cd4df28a75d622b0e6e574add33a31e2b7d36623773acf6d41c3d0bab6571c63ff720bb2039feaf46af1f9e0abb9982a1507dcd6080a51c3e2694a71ce3008265b88ef7d15d24d2dea1e195ffc2dca2816c3875b8d08199523edb7cf", 0xcb, 0x7}, {&(0x7f00000001c0)="40f7ec3459668d516f50f5b69e339411c37cc1f8778dbdabbc6256942865", 0x1e, 0x3}, {&(0x7f0000000340)="297d9855a0af3eea137de8a69b415f1384035dae24e82dde72c993c9070b24767520cc545fa0069df15eaa5b", 0x2c, 0x2}, {&(0x7f0000000380)="0fbb71f5eae902ba5d37cbea311058cf28926f98b537234c5f2d9c6d0d972afcd0dbbd584f5664017544c9f658bde3b0ae1210", 0x33, 0x7ff}, {&(0x7f00000003c0)="38a173928a635bb1e23eab5e9a453e8f5535ab77d62feb199c887954d17c6353c9419dd8e5eb640ff7a1458c649f0d453cddd19f11ce72c62752d003a2c3536190d4a1cb0c2b09610a3bf91ebb5e6b50bc2306792b66bfb90ae1b81e84ef8f95388cdb72253912d01c4b63e145a0", 0x6e, 0x80000000}], 0x402a, &(0x7f00000004c0)={[{}, {'^'}], [{@fsuuid={'fsuuid', 0x3d, {[0x64, 0x33, 0x65, 0x38, 0x67, 0x36, 0x66, 0x34], 0x2d, [0x66, 0x61, 0x31, 0x34], 0x2d, [0x34, 0x37, 0x64, 0x34], 0x2d, [0x65, 0x65, 0x30, 0x63], 0x2d, [0x34, 0x30, 0x35, 0x35, 0x36, 0x66, 0x38, 0x35]}}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@uid_lt={'uid<', 0xffffffffffffffff}}, {@uid_lt={'uid<', r2}}, {@euid_lt={'euid<', 0xffffffffffffffff}}]}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write$binfmt_misc(r4, &(0x7f0000000040)=ANY=[], 0x4240a2a0) r5 = syz_open_dev$mouse(&(0x7f00000005c0), 0x6, 0x400000) openat$cgroup_ro(r5, &(0x7f0000000600)='cpu.stat\x00', 0x0, 0x0) lseek(r0, 0x831, 0x4) mmap$fb(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0xd, 0x810, r3, 0xc2000) ioctl$NS_GET_OWNER_UID(r4, 0xb704, &(0x7f0000000580)) 23:34:07 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:07 executing program 1: socketpair(0xa, 0x2, 0x0, &(0x7f0000000000)) 23:34:07 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) gettid() rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) [ 1021.099247] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1021.099247] 23:34:07 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000200001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:07 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xbd02}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x88, 0x88, 0x6, [@restrict, @restrict, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xa6}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8200, 0x2) 23:34:07 executing program 1: futex(&(0x7f0000000040), 0x8c, 0x0, 0x0, 0x0, 0x0) 23:34:07 executing program 1: r0 = timerfd_create(0x7, 0x0) timerfd_settime(r0, 0x0, &(0x7f0000000040)={{0x0, 0x989680}, {0x77359400}}, 0x0) [ 1021.258626] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1021.258626] [ 1021.269426] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1021.269426] 23:34:07 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000bf00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:07 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000005001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:07 executing program 1: syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000012c0), 0x0, &(0x7f0000002200)={[{@umask={'umask', 0x3d, 0xffffffff7fffffff}}]}) [ 1021.336751] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1021.336751] 23:34:07 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000480)) [ 1021.540265] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1021.540265] [ 1021.589171] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1021.589171] 23:34:08 executing program 0: r0 = syz_mount_image$jfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="4a4653f5b2a8a8e3bc0000020000090000000020200000092010000000000000000004000000180000000257acffae565cb5b2f36ee66452e5ba7b476b3b85e88f92d474d9d6ec9db049deb5242251e796c081e47e3e5be3f71422d7c5f6b51fe766e0eebe00"/115, 0x73, 0x8000}], 0x0, &(0x7f0000000240)={[], [{@dont_appraise}]}) mknod$loop(&(0x7f0000000000)='.\x00', 0x1000, 0x1) statx(r0, &(0x7f0000000040)='./file0\x00', 0x4000, 0x400, &(0x7f0000000300)) mount(&(0x7f00000000c0)=@nbd={'/dev/nbd', 0x0}, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='erofs\x00', 0x2, &(0x7f00000001c0)='\'{(\x00') 23:34:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000300001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:08 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = epoll_create(0x29e) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000000)={0x30000008}) [ 1022.019556] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1022.019556] [ 1022.063571] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1022.063571] 23:34:10 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) gettid() rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) 23:34:10 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000006001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:10 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000d00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:10 executing program 1: msgget$private(0x0, 0x0) msgget(0x3, 0x10) msgget(0x3, 0x234) 23:34:10 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x30009, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r3 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r3, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r3, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10) splice(r2, 0x0, r3, 0x0, 0x30009, 0x0) setsockopt$inet_MCAST_JOIN_GROUP(r2, 0x0, 0x2a, &(0x7f0000000240)={0x7, {{0x2, 0x4e20, @multicast1}}}, 0x88) syz_mount_image$jfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)=ANY=[]) 23:34:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000400001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:10 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x4, &(0x7f0000000140), 0x4) 23:34:10 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f0000000000)={0x0, @generic={0x2, "5fc5e5959421259e7d5d3d167d7e"}, @isdn, @generic={0x0, "06f8fd75dd2468df74f55f4bf89b"}, 0x1ff}) 23:34:10 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000001000030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1024.281316] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1024.281316] [ 1024.300407] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1024.300407] 23:34:10 executing program 1: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000580)) ioctl$ifreq_SIOCGIFINDEX_wireguard(0xffffffffffffffff, 0x8933, 0x0) socket$nl_generic(0x10, 0x3, 0x10) [ 1024.433511] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1024.433511] [ 1024.434001] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1024.434001] 23:34:10 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000002c0)={'syztnl2\x00', 0x0}) 23:34:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000500001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1024.628602] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1024.628602] [ 1024.691789] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1024.691789] 23:34:13 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) gettid() rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) 23:34:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000001400030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:13 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000007001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:13 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xbd02}, 0x0, 0x0, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x10881, 0xca) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x380000d, 0x10, 0xffffffffffffffff, 0x0) preadv(r2, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x94, 0x94, 0x6, [@restrict, @restrict, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xb2}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8200, 0x2) 23:34:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000600001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:13 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000480)=ANY=[@ANYBLOB="1ace0c425834997078160cba0876e648414ebfdd0c950886fea425ac16"]) syz_mount_image$jffs2(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x1cf, 0x3, &(0x7f0000000180)=[{&(0x7f0000000140)="c5133e5662f6390098508d", 0xb, 0xfffffffffffffffd}, {&(0x7f0000000240)="48c44a1fce874c7fe8214e42a99e6ea83bf93515dc452510354c21b500e2f6c3cb23523396675348c532921ad6eed1858a4960999215766ed72d2364c70ba0096b755a606617162bb7e1eb732b609bdfad581f536ffc29c94f7db4c7ba4c477cb318ee1e05f9b74d934c6b162ddfb09dfd17b8c90d33517a892e2a305fafad9a3980b8b63cd9d89729b3e1ffa2802021898296fab0b14e655f2053b07ae78abb8034a10b0ecdb1969889cfea877ecd09de31403da6e5b4", 0xb7, 0xca78}, {&(0x7f0000000300)="6319da737403aa1ec4529373cd07c7918648793c25696ea6ff280e41a56cf30818963f92377427b90b0332a4f9e033dbcd23c460fb1188f497eb7272101d5ef59e6c7482101385028884519e30bed28bd559c0503754d0470ee127c2e1c79dd66526427b35279fcd17fcab926af77204f58ba19116fd479e3b9f79541aaa03c8932818925efacabc", 0x88, 0x7ff}], 0x110040, &(0x7f00000003c0)={[{@rp_size={'rp_size', 0x3d, 0x1}}, {@compr_lzo}, {}, {}, {@compr_zlib}, {@rp_size={'rp_size', 0x3d, 0xd7f5}}, {@compr_zlib}, {@compr_zlib}], [{@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_measure}]}) 23:34:13 executing program 1: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x84000001) 23:34:13 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="00fc142ef6822ff028116e4c74fbc9f48744abfe11e2348beb6948df656c5f892f44fadf3208753c41ea32b0ad55c544f9b9af0c19cfe7314b007a07103221ac25e498fc6fd3e84c50c20e722767c30640601a5a33576d05fd7ce84b846ff30360d4df8bc08438b84f988751b4cd5381f96a5a1d54f27b5cec41c1f89035ff9306cde94da44149f2da4ad9b8b069386d99e2c48ec904da424e354e47316b416889108a455ee546648d92710df90193c06820638f49e5b94d367c26dfee38b39d3341d5c6a58f24005d745e7c2e5492ce80217a23a982b59e91c4b28e6a2352078449c260e82ec8421bec"]) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000040)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r2, 0x0, 0x10000000030009, 0x0) openat(r0, &(0x7f00000000c0)='./file0\x00', 0x12402, 0x88) bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00', 0x0, 0x8}, 0x10) 23:34:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000001700030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1027.349728] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1027.349728] [ 1027.375103] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1027.375103] 23:34:13 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f0000000000)=0x6, 0x4) 23:34:13 executing program 1: r0 = semget$private(0x0, 0x2, 0x0) semtimedop(r0, &(0x7f0000000040)=[{}, {0x0, 0x1ff}], 0x2, 0x0) 23:34:13 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000008001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1027.550719] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1027.550719] [ 1027.647419] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1027.647419] [ 1027.760620] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1027.760620] 23:34:16 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x0, &(0x7f0000000040)) 23:34:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000bf00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000700001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:16 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000009001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:16 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x40, 0x40) 23:34:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c02030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1030.336527] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1030.336527] 23:34:16 executing program 0: syz_mount_image$jfs(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000099fb70bd02c53186000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000080)={[{@errors_continue}, {@discard_size={'discard', 0x3d, 0x6}}, {@iocharset={'iocharset', 0x3d, 'iso8859-2'}}, {@noquota}]}) [ 1030.396496] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1030.396496] 23:34:16 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000b001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:16 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f00000000c0)='./file0\x00', 0x14, 0x2, &(0x7f0000000340)=[{&(0x7f0000000240)="d293c84d9916a7d51be8f09c5dfa69e4f83db911c187f64633bdd3580f785f529df696d3525a475202899e9712cdcfa20156fcbc4b9cee1ded991a2e5a07bea5be6280d35a0faf0e20c0349632d3ca5bc18c0808e5508fbe5c8db69d595338d3164b8ddf571523cd605f86c93db6a428d80ed0928cf9f8bfabc13c4ae7b79a1863b975807c567470915bf32dcd6bd602c72a8d738e98b4cff9ad4b48bdd8265b274ab4e8bce748834ec156fd7a5368d32295d073e1f1a83f2936cde47170ca97766de912c36226cc46f2f5d50386dc52d9de3c96cc8558461b0a2a9736b2", 0xde, 0x7}, {&(0x7f0000000140)="ffcc79edefe8690fb3bfaa9bf2e73488c6214045731d583c4b89fbb313e9f8c5d7f7e60c6b0415581c7e2f20e2e9867d1b3c5fa495cb3f8e10140da3a8746586a0aa14140793386da5500e3f49d32df0d2c6c7abbd6e71c5de23eda2e5123a1408e76cc3fb670b874d5dfee91e8aea61909bcd1e532fd2cfa535aea9d9ab71fbb7130af474db69541cd32bf22e790937c156477df3b067a9d0bd47d648417f22d155f340b79ba2aa3a6967dd50ca23c8d9bcd6a242b437ec725cc12a", 0xbc, 0x1c9d}], 0x20000, &(0x7f0000000380)={[{@data_ordered}, {@sb={'sb', 0x3d, 0x5c72}}, {@barrier}], [{@context={'context', 0x3d, 'user_u'}}, {@appraise}]}) 23:34:16 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) [ 1030.504327] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1030.504327] [ 1030.630941] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1030.630941] [ 1030.742530] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1030.742530] 23:34:19 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x0, &(0x7f0000000040)) 23:34:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000800001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:19 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000140), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="008ed9af2cf0da63b5e03d7add589afa2db8cd2c3537fd81b2eb439d37fcbd4e301b97f2cf9434d0a7386b84b8cab3f2746fbb546c381811a8302c2f91b16c24010865b6b60ef08dcd38892dec62ea6df9f1fe47c7c7cceae2b36f70228801cb637e1359d01c8bc3357873be9dd3048d1c10ef438c5be5f6a968e028c95e24243378e7dd96d7d9e60ab6ce1e4e32fb97649d589b47a7444437924c910de51f"]) 23:34:19 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c03030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:19 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000c001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:19 executing program 0: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_ADD_TX_TS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r0, 0x20, 0x70bd2f, 0x25dfdbff, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_USER_PRIO={0x5, 0xd3, 0x1}, @NL80211_ATTR_ADMITTED_TIME={0x6}]}, 0x2c}, 0x1, 0x0, 0x0, 0x14000000}, 0x404c801) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="700b8e32909e10a677ce00"]) setxattr$trusted_overlay_nlink(&(0x7f0000000040)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140)={'U-', 0x7}, 0x16, 0x0) 23:34:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) [ 1033.420550] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1033.420550] [ 1033.439014] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1033.439014] 23:34:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:19 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c04030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:19 executing program 0: getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000240)={{{@in6=@initdev, @in=@private, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000080)=0xe8) syz_mount_image$jfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x1, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x7ffc}], 0x0, &(0x7f0000000340)={[], [{@fowner_eq={'fowner', 0x3d, r0}}, {@subj_role={'subj_role', 0x3d, 'dont_appraise'}}, {@func={'func', 0x3d, 'POLICY_CHECK'}}, {@hash}]}) [ 1033.581168] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1033.581168] 23:34:22 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x0, &(0x7f0000000040)) 23:34:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000900001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:22 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:22 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000040)="4a46d3310100000060760000000000000f00000c0003000002000009000000000100000000041000000000000000000481000000000000000d2047f401083f2f4773f140a520bcda00", 0x49, 0x8000}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="08d8df8fc84924b35300865764f31d1d6fc2e60823271af5fe13983eb540d97c209d05000000000000000b5aa7a3bae78177622433c88de2776999774a4ac884cc4b5324ff20058f9d6b112ba74346bfeb7060c222f63eec002d1ec0bcae9749"]) 23:34:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c05030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:22 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000d001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:22 executing program 0: r0 = accept4$ax25(0xffffffffffffffff, 0x0, &(0x7f0000000080), 0x80800) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendfile(r0, r1, &(0x7f00000000c0)=0x400, 0x16) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) [ 1036.400514] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1036.400514] 23:34:22 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000b00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c06030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1036.480258] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1036.480258] 23:34:22 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653e07e0000006076000000000000001000000c000300000200800900000000200000000920100000000000800000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) 23:34:22 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) [ 1036.661314] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1036.661314] 23:34:25 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, 0x0) 23:34:25 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="dc6dacd8386740af716da22e667f2e514142a23acee6bafff3dc08ca665d0373d514843b08bccd550e1a679757ebb489da55abc59402e2d1c65282f7cb08e85a6efc9a0b66f9db7521da8b68276511e22134a686bb275e224703aa30c01b4b00"/106]) 23:34:25 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000f001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c07030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076008e63b00c00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:25 executing program 0: ioctl$NS_GET_OWNER_UID(0xffffffffffffffff, 0xb704, &(0x7f0000000080)=0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000001c0)={&(0x7f0000000040)=[0x62, 0x3ff, 0x10000], 0x3, 0x80800, 0x0, 0xffffffffffffffff}) r3 = openat$incfs(0xffffffffffffffff, &(0x7f0000000380)='.pending_reads\x00', 0x224000, 0x4) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r4, 0x407, 0x0) write$binfmt_misc(r4, &(0x7f0000000040)=ANY=[], 0x4240a2a0) r5 = accept4(r3, &(0x7f00000005c0)=@in6={0xa, 0x0, 0x0, @empty}, &(0x7f0000000640)=0x80, 0x0) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000500), r5) r7 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000340), 0x200, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(r2, &(0x7f0000000400)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0xd61f61b965bf07dc}, 0xc, &(0x7f00000003c0)={&(0x7f0000000440)=ANY=[@ANYBLOB='$\x00\x00\x00', @ANYRES16=r6, @ANYBLOB="04002dbd7000ffdbdf25310000000800db00", @ANYRES32, @ANYBLOB="0800db00", @ANYRES32=r7, @ANYBLOB="67a77c715596ab3a7731642b5a43d54241a8924bced4e0c8aa3645bebeba85526ee760e2cd1a1518ff03b340e10db45abb79aa21d7757f03dbc50d43ceb17306f02157d197f476fb4f918f4c49444d2339255ac2f797419580bf014952345a"], 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f00000002c0)={[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@uid_lt={'uid<', r0}}, {@smackfshat}, {@uid_gt={'uid>', r1}}]}) 23:34:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) [ 1039.484883] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1039.484883] 23:34:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000f00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:25 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) [ 1039.558808] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1039.558808] 23:34:25 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) [ 1039.744402] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1039.744402] [ 1039.781921] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1039.781921] [ 1039.873831] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1039.873831] 23:34:28 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, 0x0) 23:34:28 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:28 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c08030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:28 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000010001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:28 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000001000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:28 executing program 0: r0 = syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000080)=ANY=[@ANYRESHEX=0x0]) setxattr$trusted_overlay_nlink(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000240)={'L-', 0x7fffffff}, 0x16, 0x1) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000000c0), 0x40000, 0x0) renameat2(r0, &(0x7f0000000040)='./file0\x00', r1, &(0x7f0000000180)='./file0\x00', 0x0) 23:34:28 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='%']) 23:34:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) [ 1042.584856] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1042.584856] [ 1042.593889] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1042.593889] 23:34:28 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000020001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:28 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="009d4d9ba25a2aec66d20000000042e3682db33136080bedfe8f3b2f5c3c5526486bce8e2dab84"]) 23:34:28 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x8000, 0x54) 23:34:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) [ 1042.761192] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1042.761192] [ 1042.839447] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1042.839447] [ 1042.902557] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1042.902557] 23:34:31 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, 0x0) 23:34:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:31 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0053e99e7f9947edd3e6298f60454607efbfb871b5f5620af750d4c005a410a815e48dcab57ba79cfd806c760dae99b26ff32991af434f5a0cedbf370be65db061592107698655f4ceac4d367f0f84ddf74353f5deecac2d592a98e8bb6eb7cc79297624be4dae6468d581cd1d235ef73419ee7bfb2d3d01017b240627833b799a616734ab"]) setxattr$trusted_overlay_nlink(&(0x7f0000002500)='./file0\x00', &(0x7f0000000080), &(0x7f00000000c0)={'U+', 0x1f}, 0x16, 0xfbe2fdb50e14b3d3) read$FUSE(0xffffffffffffffff, &(0x7f0000000280)={0x2020, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x2020) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fstat(r1, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r2, r2, 0x0) syz_mount_image$udf(&(0x7f0000002300), &(0x7f0000002340)='./file0\x00', 0x1, 0x2, &(0x7f00000024c0)=[{&(0x7f0000002380)="b9a74b8850b91c1da178e0ca72120f431e2c54bc0032ce6e71fadd06a136888248d586910a3263a4dc082ab1d3a3dd3d246a53ebdeebf4cf1812ce939a41", 0x3e, 0x7}, {&(0x7f00000023c0)="4a4fc67ef714d937639870363e1797d50fe1885d953a1bcb562efcf5fff1abc7753c1856904d88f1928cb90ba4201c481f22def272144eead42effbd5633ca1db4d91862c56cf9d19ad5d5e6cc14ede36e4aeaa98c9b85b62577916a6059a7bc3816587b2d46cf0a182d3e9fd771a1a39fd1a490cb97d09691f9d5c3b448f1ac505d0cd5424f4ee70d9c2440905a7706b6ad7bdb4f2e018f733f417e5979b8cb46faa0e2952918f0677760a6aa0b109a9d13dcf00ebd5604b3553350828c04df25db097a14f2b58ecce752cf9d3acb8bf174eacfcbe7c8829944d48bb1d869897b1b5029c7199e37a0c60c8acf8ae6766a24e47c6e", 0xf5, 0x7fff}], 0x2200000, &(0x7f0000002640)=ANY=[@ANYBLOB='uid=ignore,partition=00000000000000000151,undelete,subj_user=trusted.overlay.nlink\x00,fowner>', @ANYRESDEC=r2, @ANYBLOB="2c00c406f183ab0bbc230c5456f32f2220c28e2c5a04c24bb9df70c8f7b2b27501d337654e32866f9f566ba3f2d0124aa4ecac64b1a25e21907ada1daff21ac1f696d61d2cec3de79398ffb1dfd77bbf4ec21d5f1d4e0fe1eb0de229c38d1438531b763b1c2e3c4b7e619083bb5622fea2c1ff3897fcc2f7131958a06c39edd1076acd58cb0cb19e6757bea6c3535df5116b64b134368ab72bbf37b4400a2bd2a8ccde60dee5ad2df587b6f2b5adedf2072d4036351c2b1d2ac1d8b1ed9fbcbc5c524aece4f9e0d285e5"]) syz_open_procfs(r0, &(0x7f00000022c0)='map_files\x00') openat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0x240000, 0x20) 23:34:31 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c09030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:31 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000001100001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:31 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000023001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1045.590904] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1045.590904] [ 1045.598627] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1045.598627] 23:34:31 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:31 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$VIDIOC_G_EXT_CTRLS(r1, 0xc0205647, &(0x7f0000000180)={0xf000000, 0x8, 0x2, r0, 0x0, &(0x7f0000000140)={0xa00901, 0x440, '\x00', @ptr=0x3}}) fcntl$setpipe(r1, 0x407, 0x0) write$binfmt_misc(r1, &(0x7f0000000040)=ANY=[], 0x4240a2a0) write$dsp(r1, &(0x7f0000000080)="8519c7db2a993d69413a6dd0ff2dc37c896276ca15c1eab0df4650f5349740268d55edbb087bc158ded9b11e76a90318f495f55bd229807e931ce78a45ecb5218c30518f52a5c799bf37d530c1d6fe756d34a234e7651938f9df48b33cc678ad97759387b9f78619f36fad539e072d52", 0x70) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\b']) 23:34:31 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0b030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:31 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000001200001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:31 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:32 executing program 1: socket$nl_generic(0x10, 0x3, 0x10) r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) [ 1045.817924] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1045.817924] [ 1045.917712] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1045.917712] [ 1045.968909] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1045.968909] 23:34:34 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) lsetxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), &(0x7f0000000140)='./file1\x00', 0x8, 0x0) mount$overlay(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x22000, &(0x7f0000000340)=ANY=[@ANYBLOB="78699d926e6f3d6f66662c696e6465783d6f6e2c657569643c78bf61faf93440860585679a77338402449125c40c03836644b966e82a3528e6fcb1130d69cac52390f57f5c1fa6f4569deb784e4cc6cb2db9cc8a465939b30c01911c91e21d6ba2f766405b73c1dbd30d38f1af67f4c232c7cfd82123abfe1ac9dd0233f7da39e4713572c64256a39dce51381e66751c2ac1a49393efb7228f52f51445000000000000", @ANYRESDEC=0xee01, @ANYBLOB=',context=sysadm_u,context=system_u,measure,euid<', @ANYRESDEC=0xee00, @ANYBLOB='\x00\x00']) 23:34:34 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0f030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:34 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000031000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:34 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000001300001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:34 executing program 4: r0 = semget(0x1, 0x0, 0x0) semctl$IPC_SET(r0, 0x0, 0x1, &(0x7f0000000340)={{0x0, 0xee00, 0xffffffffffffffff, 0xee00, 0xee00}}) 23:34:34 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000051000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1048.620566] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1048.620566] 23:34:34 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:34 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000000)={0x6, 0x0, 0x0, 0x6}, 0x40) 23:34:34 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000001f00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:35 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, &(0x7f0000000040)={&(0x7f0000ffb000/0x4000)=nil, 0x4000}, &(0x7f0000000080)=0x10) 23:34:35 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000061000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:35 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c23030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:35 executing program 4: r0 = epoll_create(0x4) r1 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_MOD(r0, 0x3, r1, &(0x7f0000000000)={0x50000006}) [ 1048.925862] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1048.925862] 23:34:35 executing program 0: pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x4240a2a0) sendmsg$NFT_MSG_GETGEN(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x14, 0x10, 0xa, 0x301, 0x0, 0x0, {0x2, 0x0, 0xc0}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40800}, 0xc0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ethtool(&(0x7f00000002c0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_STRSET_GET(r1, &(0x7f0000000600)={0x0, 0x0, &(0x7f00000005c0)={&(0x7f0000000300)={0x20, r2, 0x200, 0x4, 0x0, {}, [@ETHTOOL_A_STRSET_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x20}, 0x1, 0x0, 0x0, 0x800}, 0x0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r1, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, r2, 0x200, 0x0, 0x25dfdbfd}, 0x14}}, 0x20044000) getsockopt$inet_mreqn(r0, 0x0, 0x24, &(0x7f0000000280)={@remote, @multicast2, 0x0}, &(0x7f00000002c0)=0xc) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000300)={'batadv_slave_0\x00', 0x0}) sendmsg$ETHTOOL_MSG_WOL_SET(r0, &(0x7f0000000880)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000840)={&(0x7f0000000340)={0x4ec, r2, 0x10, 0x70bd27, 0x25dfdbfd, {}, [@ETHTOOL_A_WOL_MODES={0xe0, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0x20, 0x3, 0x0, 0x1, [{0x1c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x151f9b60}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x80}]}]}, @ETHTOOL_A_BITSET_BITS={0xb8, 0x3, 0x0, 0x1, [{0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x10001}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x800}]}, {0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x15, 0x2, '#+$\'$}:%[s}%}/%\x04\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x5, 0x2, '\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}]}, {0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x200}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x96}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}]}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_WOL_MODES={0x238, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_MASK={0x1e, 0x5, "c3331edd301de50f17733448643df521dcf7940599dec8371efa"}, @ETHTOOL_A_BITSET_MASK={0xec, 0x5, "64bbd27cd9ed94315cb5cb087be1e3045cf8adf245200820364efed0dcda1a307aec90a2fb253c0c437ecba58e99ae02e1d436b43eca1dfeb010169ff342564035833ecf6eabcef85e59ce47c668a902e0f9159d392955682b06dce8c70d136da53e9ce03798496b79616ea515e74014ebd6f7eb508c01f2664a7d39f1f7bbca0c021e32e57f59ba7b940af065562026d7e6da8797ce5bcbc0295a4ea53a39bc0616c43940d8f9a353224dd8c27151a8c77bc3c89359f9b625ed1b6f36961180d45c3cf9ed0fb1f64c201ba52034035925f9602a6763fb1d2570b2a163b32159f4d4bab997dad1cc"}, @ETHTOOL_A_BITSET_VALUE={0xc1, 0x4, "8dbe7a695b508e6aa512b7539064f6722d616eb6846a6239eafbfb27ca7418d7918266f9ee2e80b51c0fac4edd54027cd03be6075c07db0d855e2cbb5d1210c4a9522e6e3b992d09f72ce059f48a8cd06a74911bc4985f59e5c3a9abccaf8dfdc53195f56ab3f1f0296029949056064875ab7ffe945d770fe49ebd7558c0da7d3807c9ac5f54d459978b97d774f7a16296e3f3c9d9a7aab216bcf7aa536251bdcfb1dfde4b7700656f5cbc21b0f7bdaf1c23657ca96f760b19d2be787a"}, @ETHTOOL_A_BITSET_VALUE={0x64, 0x4, "c0e0fa654ea0fe16596772353995e4f641dd71e521cf0f0a15570486bc4e41d1a43353e63a12df37b3d7224ba1310ced721e1e95f668dffc9276fd89e7a28638d86b1236f2e1a5576863c0b10b548be44b05360ed2c8ae29229409270a5fb6a4"}]}, @ETHTOOL_A_WOL_SOPASS={0x65, 0x3, "ff24139cbd9fe0d977297c7e5b33ffaff409edbe9ffe25940f1feb6b129f6c8126bc9c77df6c854c4c6bb612180e9f14a258c782f1466b26215d77279104bd4995e23484e62aed677244a186228516f49d0b37e94dd2a42cf0d97d7f301aedbc46"}, @ETHTOOL_A_WOL_MODES={0xfc, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_BITS={0xec, 0x3, 0x0, 0x1, [{0x44, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfffffffb}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x1}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x6}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}]}, {0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}]}, {0x8, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}, {0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x5}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, '^\x90^\x00'}]}, {0x28, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x7f}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}]}, {0x20, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x8}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0xfff}]}, {0x14, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8, 0x1, 0x9}, @ETHTOOL_A_BITSET_BIT_NAME={0x8, 0x2, 'jfs\x00'}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8, 0x2, 0xe7ce}, @ETHTOOL_A_BITSET_NOMASK={0x4}]}, @ETHTOOL_A_WOL_SOPASS={0xe, 0x3, "d2fac4f6937dc3dc7158"}, @ETHTOOL_A_WOL_HEADER={0x4c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_to_bridge\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}]}]}, 0x4ec}, 0x1, 0x0, 0x0, 0x4090}, 0x4000) openat(r0, &(0x7f00000001c0)='\x00', 0x420000, 0x100) 23:34:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:35 executing program 4: futex(&(0x7f0000000040), 0x0, 0x0, &(0x7f0000000080)={0x0, 0x3938700}, 0x0, 0x0) 23:34:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) [ 1049.091403] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1049.091403] 23:34:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:35 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000071000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:35 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000002000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r1, 0x0, 0x0) 23:34:35 executing program 4: sendmsg$ETHTOOL_MSG_WOL_SET(0xffffffffffffffff, 0x0, 0xaf586ebdb11f0424) 23:34:35 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00070000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r1, 0x0, 0x0) 23:34:35 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f00000001c0)={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_hmac_sha384\x00'}, 0x58) [ 1049.360740] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1049.360740] [ 1049.448890] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1049.448890] [ 1049.455554] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1049.455554] [ 1049.586504] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1049.586504] 23:34:36 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0), 0x10040, 0x0) setsockopt$kcm_KCM_RECV_DISABLE(r0, 0x119, 0x1, &(0x7f0000000140)=0x8, 0x4) r1 = syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="98"]) statx(r1, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000240)) setxattr$trusted_overlay_nlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), &(0x7f0000000340)={'U-', 0x3}, 0x16, 0x7) 23:34:36 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000091000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r1, 0x0, 0x0) 23:34:36 executing program 4: r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$PPPIOCNEWUNIT(r0, 0xc004743e, &(0x7f0000000040)=0x1) 23:34:36 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000002300001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:36 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00140000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) [ 1049.966158] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1049.966158] [ 1049.975655] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1049.975655] 23:34:36 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x7ffc}], 0x20, &(0x7f0000000080)={[], [{@obj_role={'obj_role', 0x3d, '-*'}}, {@smackfstransmute={'smackfstransmute', 0x3d, '*\x19+\xf4\x8f\x01\xcb\x87\x00\x00\x00\x00\x00\x00\x00\x00'}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}]}) 23:34:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 23:34:36 executing program 4: r0 = semget$private(0x0, 0x2, 0x0) semctl$SETALL(r0, 0x0, 0x11, &(0x7f0000000040)) [ 1050.081700] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1050.081700] 23:34:36 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x71, 0x8000}], 0x0, &(0x7f0000000040)) 23:34:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) 23:34:36 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000080)={[{@errors_remount}, {@resize_size={'resize', 0x3d, 0x3}}, {@usrquota}, {@noquota}]}) 23:34:36 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000b1000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:36 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000003f00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:36 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00bf0000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:36 executing program 4: prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc8, 0xc8, 0x5, [@union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0xe5}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 23:34:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 23:34:36 executing program 0: r0 = syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="4c95763d89d5a2000000000000000000008edcfb"]) r1 = bpf$OBJ_GET_PROG(0x7, &(0x7f00000000c0)={&(0x7f0000000080)='./file0\x00'}, 0x10) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r2, 0x407, 0x0) write$binfmt_misc(r2, &(0x7f0000000340)=ANY=[@ANYRES64, @ANYBLOB="60fc05df6b069f66890a7271f51845306740f670b56e89fedea2c4b0c16d06d5ee4b05f756bdab0c1a62ef7dbc810f4a280cafefe1b345b786717c23d56c8099848a6c4f4d2b07945d68e414936ca962d470dee4bc93a865e3ee20a759fad42141786871b6a908b668ce45e92efeda77ab5f552d5b1d4ccaa9d4c4c103bb01a156f12a35ecadbd26b7ee265de88b4521c3a57318dbaed8641ad78504055433a660fc651da476c912b55a8d7ae64737df5b9f858871cd8fb003e82c61236be9528187f48114742c71cfed8df460b5adc4c358ac400f9a7af83f98a55734acb1ae20f9c99d80"], 0x4240a2a0) r3 = fcntl$dupfd(0xffffffffffffffff, 0x406, r0) r4 = syz_open_dev$vcsn(&(0x7f0000000180), 0x7, 0x200) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, r4) ioctl$sock_kcm_SIOCKCMATTACH(r2, 0x89e0, &(0x7f0000000140)={0xffffffffffffffff, r1}) 23:34:36 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f00000006c0)={'sit0\x00', &(0x7f0000000640)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @empty}}) [ 1050.390999] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1050.390999] [ 1050.409707] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1050.409707] 23:34:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 23:34:36 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c03ca0000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1050.471378] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1050.471378] 23:34:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 23:34:36 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000c1000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:36 executing program 4: r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) 23:34:36 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000004800001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:36 executing program 4: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xbd02}, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x12, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x94, 0x94, 0x6, [@restrict, @restrict, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xb2}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8200, 0x0) 23:34:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:36 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000d1000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:36 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c7fff0000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1050.833200] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1050.833200] [ 1051.017602] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1051.017602] 23:34:37 executing program 0: ioctl$FS_IOC_GETFLAGS(0xffffffffffffffff, 0x80086601, &(0x7f0000000040)) r0 = syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f00000003c0)=ANY=[@ANYBLOB="00bca918b904482b11571214e214087d0e5802b5a84ce6b11647502e89af85dae1918862a8be900d485c99f9ad53c4bba296381a7ed0d1c646c5b48393b386bbf5afc53365023ab202c7f26ee90bb4244306fb8b8fe54c589e3cc975b64777342dbba54ae83d07f10dd0d4e8e3a2dcff67136c563f6eb9819c4d3a634ff1ec5b2583155feaef986e1bbbb250924053f32d1a845d6867436281ead8f662dd415ab901f4401c2e2279efaae3f77690de25a3c9ed969834ed8ce4609d309950b400000000002cbdf8e06cfc5d72c2e630b315e2998ed72b9dc4f6b50ddc73e89ed0fa8958e3c3f6cf46f579e55ff52026736e5e2a0f656fda29f2051d273453167481c8"]) readv(r0, &(0x7f00000001c0)=[{&(0x7f0000000080)}, {&(0x7f00000000c0)=""/58, 0x3a}, {&(0x7f0000000140)=""/112, 0x70}, {&(0x7f0000000340)=""/88, 0x58}], 0x4) 23:34:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:37 executing program 4: futex(0x0, 0x8c, 0xffffffff, 0x0, 0x0, 0x0) 23:34:37 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000f1000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:37 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000004c00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:37 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00040000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:37 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r0, &(0x7f0000000080)) 23:34:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, 0x0, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) [ 1051.358639] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1051.358639] [ 1051.379055] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1051.379055] 23:34:37 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000160000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) 23:34:37 executing program 0: r0 = syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) openat(r0, &(0x7f0000000080)='./file0\x00', 0x2940, 0x1) 23:34:37 executing program 4: futex(0x0, 0x8c, 0x0, 0x0, &(0x7f00000000c0), 0x0) futex(&(0x7f0000000000), 0x6, 0x0, &(0x7f0000000080), 0x0, 0x0) 23:34:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:37 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000201000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:37 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00070000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:37 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000006000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:37 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x1) 23:34:37 executing program 4: socketpair(0x11, 0xa, 0x400, &(0x7f0000000040)) 23:34:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:37 executing program 0: ioctl$SIOCGETLINKNAME(0xffffffffffffffff, 0x89e0, &(0x7f0000000000)={0x2}) [ 1051.758005] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1051.758005] [ 1051.769954] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1051.769954] 23:34:38 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000231000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:38 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000000180)) 23:34:38 executing program 0: r0 = syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)={[{@discard_size={'discard', 0x3d, 0xfffffffffffffffd}}, {@quota}]}) preadv(r0, &(0x7f0000000540)=[{&(0x7f0000000140)=""/120, 0x78}, {&(0x7f00000001c0)=""/200, 0xc8}, {&(0x7f00000002c0)=""/80, 0x50}, {&(0x7f0000000340)=""/173, 0xad}, {&(0x7f0000000400)=""/81, 0x51}, {&(0x7f0000000480)=""/164, 0xa4}], 0x6, 0xa97, 0x7ff) openat(r0, &(0x7f00000000c0)='./file0\x00', 0xe01, 0x8) 23:34:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x0, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) [ 1051.899412] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1051.899412] [ 1051.901129] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1051.901129] 23:34:38 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00100000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:38 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x105, 0x105, 0x5, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0]}}, 0x0, 0x125}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:34:38 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000003f1000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:38 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000006800001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:38 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) lgetxattr(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)=@random={'user.', '\x00'}, &(0x7f0000000440), 0x0) r3 = openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f00000000c0), 0x44403, 0x0) fcntl$F_SET_RW_HINT(r0, 0x40c, &(0x7f0000000300)) ioctl$FS_IOC_READ_VERITY_METADATA(r3, 0xc0286687, &(0x7f00000002c0)={0x1, 0x8, 0x9a, &(0x7f0000000140)=""/154}) bpf$BPF_GET_MAP_INFO(0xf, &(0x7f0000000380)={r0, 0x28, &(0x7f0000000340)}, 0x10) setresuid(r1, r1, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x4, &(0x7f0000000240)=ANY=[@ANYBLOB='u=', @ANYRESHEX=r1, @ANYBLOB=',grpquota,noquota,gid=', @ANYRESHEX=r2, @ANYBLOB=',errors=remount-ro,\x00']) 23:34:38 executing program 4: r0 = msgget$private(0x0, 0x0) r1 = msgget$private(0x0, 0x0) msgctl$IPC_RMID(r0, 0x0) msgctl$IPC_RMID(r1, 0x0) [ 1052.186325] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1052.186325] 23:34:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:38 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00140000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1052.280478] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1052.280478] 23:34:38 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="0027bb0e6511eba5a5558c8b09726a9bb286d4"]) 23:34:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) r2 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_STA_WME={0x4}, @NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x2c}}, 0x0) 23:34:38 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)={0x1c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), r0) syz_genetlink_get_family_id$tipc(&(0x7f0000000000), r0) [ 1052.371839] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1052.371839] 23:34:38 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000006c00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}]}, 0x20}}, 0x0) 23:34:38 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000401000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1052.483428] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1052.483428] 23:34:38 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setpipe(r0, 0x407, 0x0) write$binfmt_misc(r0, &(0x7f0000000040)=ANY=[], 0x4240a2a0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x8) 23:34:38 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00bf0000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}]}, 0x20}}, 0x0) [ 1052.629233] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1052.629233] 23:34:38 executing program 4: msgctl$MSG_STAT(0x0, 0xb, &(0x7f0000000000)=""/3) 23:34:38 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x20, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_STA_WME={0x4}]}, 0x20}}, 0x0) [ 1052.743938] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1052.743938] 23:34:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x28}}, 0x0) 23:34:39 executing program 4: syz_open_dev$usbmon(&(0x7f00000000c0), 0x0, 0x301) [ 1052.785207] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1052.785207] 23:34:39 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000007400001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x28}}, 0x0) 23:34:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000b00)={&(0x7f0000000a40), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}]}, 0x1c}}, 0x0) 23:34:39 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000fff1000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1052.896531] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1052.896531] 23:34:39 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(r0, &(0x7f0000000b00)={&(0x7f0000000a40), 0xc, &(0x7f0000000ac0)={&(0x7f0000000a80)={0x1c, r1, 0x1, 0x0, 0x0, {}, [@NL80211_ATTR_REG_ALPHA2={0x7, 0x21, 'aa\x00'}]}, 0x1c}}, 0x0) [ 1053.175965] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1053.175965] [ 1053.288756] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1053.288756] 23:34:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x7fff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000080)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x10000}], 0x1040000, &(0x7f00000000c0)={[{@umask={'umask', 0x3d, 0x8}}]}) 23:34:39 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x28}}, 0x0) 23:34:39 executing program 4: semop(0x0, &(0x7f00000002c0)=[{0x0, 0x200}], 0x1) 23:34:39 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00ca0300020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:39 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000004000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:39 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000007a00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:39 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x7f, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) recvmmsg(r0, &(0x7f0000001ac0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x12000, 0x0) 23:34:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB='\a']) [ 1053.602758] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1053.602758] 23:34:39 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000008000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:39 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030200020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:39 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xbd02}, 0x0, 0x4, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x94, 0x94, 0x6, [@restrict, @restrict, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xb2}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x2) [ 1053.681344] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1053.681344] 23:34:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0), 0x200080, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x30009, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x24040, 0x18) [ 1053.837274] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1053.837274] 23:34:40 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) inotify_rm_watch(r0, 0x0) 23:34:40 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600ffffff8c00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:40 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x4cc376eb830a223f, 0x1}, 0x40) [ 1053.939940] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1053.939940] 23:34:40 executing program 4: r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCDELRT(r0, 0x890c, 0x0) 23:34:40 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0xca) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@restrict, @restrict, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x96}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8200, 0x2) 23:34:40 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000000b000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1054.063200] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1054.063200] 23:34:40 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0xca) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@restrict, @restrict, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x96}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8200, 0x2) [ 1054.103672] ptrace attach of "/root/syz-executor.4"[30754] was attempted by "/root/syz-executor.4"[30756] [ 1054.145241] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1054.145241] [ 1054.152470] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1054.152470] 23:34:40 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030300020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:40 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000cb0638e00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:40 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000fff000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1054.318828] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1054.318828] [ 1054.338495] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1054.338495] [ 1055.576815] ieee802154 phy0 wpan0: encryption failed: -22 [ 1055.582771] ieee802154 phy1 wpan1: encryption failed: -22 23:34:42 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xbd02}, 0x0, 0x4, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x94, 0x94, 0x6, [@restrict, @restrict, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xb2}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x2) 23:34:42 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600ffffff9700001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:42 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030400020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:42 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000040000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:42 executing program 0: r0 = syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) getdents(r0, &(0x7f0000000080)=""/73, 0x49) r1 = syz_open_dev$audion(&(0x7f0000000140), 0x100000001, 0x4c200) openat(r1, &(0x7f0000000180)='./file0/file0\x00', 0x40000, 0x0) 23:34:43 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030500020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1056.812162] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1056.812162] 23:34:43 executing program 0: sendmsg$IPSET_CMD_LIST(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x22004}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x6c, 0x7, 0x6, 0x101, 0x0, 0x0, {0xa}, [@IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FLAGS={0x8}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x6}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0xffff}, @IPSET_ATTR_PROTOCOL={0x5}, @IPSET_ATTR_SETNAME={0x9, 0x2, 'syz0\x00'}, @IPSET_ATTR_FLAGS={0x8, 0x6, 0x1, 0x0, 0x9}]}, 0x6c}, 0x1, 0x0, 0x0, 0x40}, 0x20000804) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) 23:34:43 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000080000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1056.934014] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1056.934014] [ 1056.943535] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1056.943535] [ 1057.071821] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1057.071821] [ 1057.076327] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1057.076327] 23:34:43 executing program 4: r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0xca) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280), 0x0, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x78, 0x78, 0x6, [@restrict, @restrict, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0x96}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x8200, 0x2) 23:34:43 executing program 0: r0 = syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="008a8ca2aefba5a5384afa0fc3a036a7e88a6566fa765e41687c25ad9479fc9d641a6a3bceeaafac7bf2fdefa382755c748c9b26389857f1c1f46164f47c76040d8aa0da58898f9b342e2c42824cb53980f597646ee22aaf3ee57288a328fc01b403761c2d4e11248693b35e90abf574e328fbd15c915a6f92d0aa782cd0a10f81ecb7a1d75e5537bd23fc8e4c431599f591743cec66f7ee1c3120744888f3aef97f33a6c79a94d14f1b936ce23aeffe18f607042b6a143ac205b7f60831b9976ca708ba056f668515c95beb549d410b10f48f66d06787900386b9bfdca504bd92d553c07f39254aba19d92e9465f7047b55fcac118e5156915219e5d16f86458a79c2d9cb8f4d6caa45fe254f9d68169bb642e5b1a98c6a163858c6459a951e5759ae430e6718998a21a3432671f0a8ddf37a272c54bf89f7e9269179209ac2330e33c378b0958e8d7e8b4cba47e86b5299f4e75be69dc57f95335ea91bf8a0cb1565268593873393c021995447c2781a9af87e73b6881f6853e15bb7609c19b14f2cf852f3a793c149175b4d5b3dffedfd3433deb4ccd97ca1"]) r1 = openat(r0, &(0x7f0000000080)='./file1\x00', 0x280, 0x0) openat(r1, &(0x7f00000000c0)='./file1\x00', 0x1, 0x144) 23:34:43 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000edc000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:43 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$packet_fanout(r0, 0x107, 0x12, &(0x7f00000000c0)={0x3, 0x5}, 0x4) setresuid(r1, r1, 0x0) read$FUSE(0xffffffffffffffff, &(0x7f0000000140)={0x2020, 0x0, 0x0, 0x0}, 0x2020) syz_mount_image$jfs(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000000), 0x1008010, &(0x7f0000002240)=ANY=[@ANYBLOB='uid>', @ANYRESDEC=r1, @ANYBLOB=',uid>', @ANYRESDEC=r2, @ANYBLOB="208209e0549462267f3e57a42c00659506dd234e95d8f43f37f269a7569055f2f3f62b4cca92ec5df34ceb7923dddb3a6c0732ad62e79e525c2e06be518210fe5c47b3f2d5f479b24c2db89f80fb77216f35881f6d3372247aef2c2db22c220d4b316c"]) [ 1057.301160] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1057.301160] [ 1057.379617] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1057.379617] 23:34:46 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000b0000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:46 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030600020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:46 executing program 1: perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9, 0xbd02}, 0x0, 0x4, 0x6, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() prctl$PR_SET_PTRACER(0x59616d61, r0) clone(0x86a01780, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) preadv(0xffffffffffffffff, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f00000004c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x94, 0x94, 0x6, [@restrict, @restrict, @enum={0x0, 0x2, 0x0, 0x6, 0x4, [{}, {}]}, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @fwd]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xb2}, 0x20) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000040)}, {&(0x7f0000000000)="0832f497d38350418e4bb321019511dc5df26e9a0b90cb6974f527cc14538d1efb1ffe03284f6d33265be9c604c893f20e96beeb2aa4c457ac37a3a3f1ce8682500fcecd80", 0x45}], 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x33) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file0\x00', 0x0, 0x2) 23:34:46 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="80"]) 23:34:46 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600fffffff000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:46 executing program 0: getsockopt$IPT_SO_GET_INFO(0xffffffffffffffff, 0x0, 0x40, &(0x7f0000000080)={'filter\x00', 0x0, [0x6, 0x5, 0x10, 0x4, 0x8]}, &(0x7f0000000140)=0x54) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="405772b783334ab7b704e71fbc191d7b380dd92a060004725e1fa0dbd57a0c3ef02dc6cbefe3a6ea4601010000000000008aa9b9f662a46c74d45e"]) [ 1059.885934] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1059.885934] 23:34:46 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x205100c, &(0x7f0000000080)=ANY=[@ANYRES64]) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x400802, 0x3) 23:34:46 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000100000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1059.999844] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1059.999844] [ 1060.013791] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1060.013791] 23:34:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_STATION(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x14, r1, 0x1, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), r0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000900), r0) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r2, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000300)={0x18, r3, 0x1, 0x0, 0x0, {}, [@ETHTOOL_A_LINKMODES_OURS={0x4}]}, 0x18}}, 0x0) 23:34:46 executing program 0: r0 = syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000080)=ANY=[@ANYBLOB="008a6babedab7e711319fddde2099b7a6295"]) openat(r0, &(0x7f0000000040)='./file0\x00', 0x40000, 0x74) 23:34:46 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030700020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:46 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600fffffff400001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:46 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000021000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1060.284334] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1060.284334] [ 1060.286679] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1060.286679] [ 1060.313610] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 1060.326866] netlink: 'syz-executor.4': attribute type 3 has an invalid length. [ 1060.461741] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1060.461741] [ 1060.464933] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1060.464933] 23:34:49 executing program 1: socketpair(0x0, 0x8000f, 0x0, &(0x7f00000000c0)) 23:34:49 executing program 0: ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000080)=[0x131, 0x5, 0x6, 0x1000, 0x2, 0x3f, 0x2], 0x7, 0x80800, 0x0, 0xffffffffffffffff}) ioctl$KVM_SET_MSRS(r0, 0x4008ae89, &(0x7f0000000140)={0x6, 0x0, [{0x861, 0x0, 0x8000}, {0x1a2, 0x0, 0x18}, {0x8ce, 0x0, 0x1ff}, {0x1af, 0x0, 0x4e5}, {0x4000009f, 0x0, 0xfffffffffffffffd}, {0x25c, 0x0, 0x7c0000000000000}]}) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) 23:34:49 executing program 4: r0 = timerfd_create(0x9, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x0, 0x989680}, {0x77359400}}, &(0x7f0000000080)) 23:34:49 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000031000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030800020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600fffffff500001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:49 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xf1, 0xf1, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x110}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:34:49 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="004a1a237a47831bbf86cf55593644f98c665e68646b65794bc32ff32c56add4157c0183634f47ea092364896695aafedd95a02ebd65713aeca0c940f55e7b5b1b4b9b0d2001fe87711a9a0e8d9a6bf36d41d7b52aaacedf3b4dae2b7501b72dd551204753cbbe977d8076130a07d9c268cd6a468cc8bef2cb6de56254b8a3daa05936f6b57f2a6f926261bfecf4df8afbdfc8867ea8c75171fb3d4900da456d4e52560fa85ae8606bffffbad1a6176cab32f020d19f100848937d4272f144423d19e144a7ed72f9d7d297757da048e2d50d3412063e87c463a1a28d7d153a44cd7d4c0eee8f7c1f924133aef989dfba8a13b3a060e386576fc7de7f2f6a7f29e281088c28f4fd4d6edfda9916f24aec16f1988fce2cf8fa4431d8d699341b03ebc9c16584d54efb3aa56f4ea6e5ee21960c2c38203e7aae39e1599a69b8481ae99f3a26358965fb045ae025f4adae8701a8a9c45834c2dfd534fe3f50b32f0251ee46212d68717d816ad7dfb37a0f4057f61b4cbfdf01b7365702d7d42be05a5263f3d40a413e1278d611b351969f1800670b2b1a91b248bedbaa78d1632b109e1519d3d03806945155372bdbd7"]) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x4) syz_mount_image$ubifs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0xdf03, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="898a32b548b69a8216bc52699e3e8aa74077435cd63eff9544f6d33ea0a8dd3f525e49a072b8e6e78ec1f780236aadbc279d67427c6d723dac3af804890ed557a016bf78ff26aae710785605686b009a0cf8439dbe7937a3e138eee309e7421467ac2059b4f4a1d24123f8aa7df5a431dc3b82cf52725480ff71989e998a3ddd2c0eaf7562f212ca08038a6e209388608dc075d0f38b442730660e35932163a915295dbbabcf7b9d5e0f4820b4d98b1790f7724ba6e750170d20c61a", 0xbc, 0x1}], 0x4800, &(0x7f0000000280)={[{}, {@chk_data_crc}, {@auth_hash_name={'auth_hash_name', 0x3d, 'sha1'}}, {@bulk_read}], [{@subj_user={'subj_user', 0x3d, '(\xbb/{$'}}]}) 23:34:49 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000041000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1062.996488] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1062.996488] [ 1063.003815] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1063.003815] 23:34:49 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xb4, 0xb4, 0x6, [@const, @func_proto={0x0, 0x6, 0x0, 0xd, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xd2}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:34:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600fffffff600001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030900020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:49 executing program 4: r0 = semget(0x1, 0x0, 0x0) r1 = semget(0x1, 0x3, 0x304) semtimedop(r1, &(0x7f0000000000)=[{0x0, 0x0, 0x3c00}], 0x1, 0x0) semctl$IPC_RMID(r0, 0x0, 0x0) 23:34:49 executing program 0: fsetxattr(0xffffffffffffffff, &(0x7f0000000340)=@random={'btrfs.', '\x00'}, &(0x7f0000000380)='trusted.overlay.nlink\x00', 0x16, 0x2) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x5) tkill(r0, 0x36) r1 = socket$phonet_pipe(0x23, 0x5, 0x2) sendmmsg(r1, &(0x7f0000000480), 0x0, 0x4000000) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$getsig(0x4202, r0, 0xffffffffffffff01, &(0x7f00000002c0)) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="00a0f509bec57031e584ee5eb67fe953d94931fc475178e957ed7dc6f2c9e6858b176faa885e709ae52b0eb67ad2e3cd443abeef69a16f293594f9c11f1e4f1287269d88e6658b340baf0dfc6833a0d17b24f1f905bcac3d1af48cd594d3952c7f6b6d01683b27d76735c0bf353b2d8d659482ecc292d6aebb455ec3931e6e"]) bpf$OBJ_GET_PROG(0x7, &(0x7f00000001c0)={&(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x8}, 0x10) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000003c0)={0x0}, &(0x7f0000000400)=0xc) ptrace$poke(0x5, r2, &(0x7f0000000440), 0x5) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000180)={'U-', 0x5}, 0x16, 0x2) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0/../file0\x00', 0x4040, 0x44) 23:34:49 executing program 1: msgctl$MSG_INFO(0x0, 0xc, &(0x7f0000000000)=""/28) 23:34:49 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x111, 0x111, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x130}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:34:49 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000051000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1063.320966] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1063.320966] [ 1063.349238] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1063.349238] 23:34:49 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f00000008c0)=ANY=[@ANYBLOB="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"]) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @loopback}, 0x10) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r2, 0x0, 0x30009, 0x0) openat(r0, &(0x7f0000000080)='./file0\x00', 0x121880, 0x78) r3 = openat$ttyprintk(0xffffffffffffff9c, &(0x7f00000000c0), 0x20000, 0x0) r4 = syz_mount_image$nfs(&(0x7f0000000140), &(0x7f0000000240)='./file0/file0\x00', 0xffffffffffffffff, 0x7, &(0x7f0000000700)=[{&(0x7f0000000280)="aeb794dc24d538a4276893190f92fa2e782fa62fd43f811b35af77eb2f2636e3a5209555ac8cca6ed540484d915fbeaa7b98d33339fa0d68963c2a5b3fdfa79904c81662aca63bfff1d9e2c119b360f168a24e70a7c2b5f90b950308c30f1e7a8c94906d6d453c0a2011090954b8b2451da8f4a665e48189362e256689767f151f4e8760108ed90e5d5c28dc42996dc43e323195ba480fea354f1258f741e7ad97fa05dcdbf8df5d109bef9dc85c7d85704366fd87385e1ed36933d5d0146d56cc319ac8a09a48a35a4ec9b14a54bd985e", 0xd1, 0x200}, {&(0x7f0000000380)="104d32a9a75f03e08cbb9869fe40ce3087c9b9d93c48adcac99f9914c2bdc94787e78affbdeed7bddec7f39e1d60f6db27b14bb22ed7c702c18ae56206aa9280724bca88868330b8df9fb35051832466d8455482c85d5ea473", 0x59, 0x6}, {&(0x7f0000000400)="53012ffd6531e93ce4344e7cf166fd3d84c3bdc593d5e9f87ef15d7770fefa965716557b25630f75f409c4f6a6ac3ef3ee038ae134b15ba61b", 0x39, 0x40}, {&(0x7f0000000440)="fba536224f235414554a62f91c9c958e3eb863f6918b940e8767684e369805f7a37596c2ad672911cf327608e5dc3476957a4b13459ed3e7b80a4130ccace26d476b47575ee259dad2894507d6b888549aa59018e3841f08ac1c3b1bb22749ad5b8f511f030bdcc6cb621f16a1a90941a95bd6c4104594866a1523b6802d3383734134ad07253ba8304f892f9a0db3cdfb", 0x91, 0x7fff}, {&(0x7f0000000500)="64198974729b43ba9d5721b1c66cb8c0a763956f459f44da60ff5af9f2c3e98ca3bd0939cb1f7c437e18e20255004b35c08ac4f6a0a4b8d8ba9d4d186777101eb345", 0x42, 0x4}, {&(0x7f0000000580)="418d7dd5a3c7951b98668db066a94fa99d92b6a5c9484511dc5cb6df1d29c0c5d9d2f1fcc7a9434a7d2d3ba2c1f1b950b1bb23568d0f62b2f93646f7d46de55167bfa7ee40b5c2675927185a1faa0367ff64fbd7d1d3842c829de8e4f886b4f5d8a7d50b412cf5156241d5b63725f9b065005389bebf53127b35fc1e12cb1abbb0666ae43097862a9878db038b47c9548f5235a0960f", 0x96, 0xfffffffffffffffb}, {&(0x7f0000000640)="90086ebf16226f7f4a72335170cafcdff1c6a4f16e22c2e08e6d5d98cde384e26852330d26c9479473e6be685225bcef0153fcbdb61b20ec8ed5c3bda5bc7749eb3a64e0e7b48b2ce7cd71ed910284f8b98c2be3aba2ef140df389d24cdd2aa475c6915b2cdf5a162e7fa9219dd2fa1a684b5d434e07ba06cd3fae18d9d97bef30d3", 0x82, 0x800}], 0x1004818, &(0x7f00000007c0)={[{'jfs\x00'}], [{@hash}, {@fowner_gt={'fowner>', 0xee01}}, {@subj_role={'subj_role', 0x3d, ':['}}, {@rootcontext={'rootcontext', 0x3d, 'root'}}, {@pcr={'pcr', 0x3d, 0x2}}, {@euid_lt={'euid<', 0xee00}}, {@fowner_lt={'fowner<', 0xee00}}, {@obj_type={'obj_type', 0x3d, 'jfs\x00'}}]}) sendfile(r3, r4, &(0x7f0000000880)=0x1, 0xb1) r5 = socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r5, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_INTERFACE(r5, &(0x7f0000000340)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000000)={0x24, r6, 0x5, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_4ADDR={0x5}]}, 0x24}}, 0x0) sendmsg$NL80211_CMD_FLUSH_PMKSA(r1, &(0x7f0000000a80)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000a40)={&(0x7f0000000a00)={0x14, r6, 0x200, 0x70bd2a, 0x25dfdbfd, {{}, {@void, @void}}, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40}, 0x48005) 23:34:49 executing program 4: socketpair(0x1f, 0x0, 0x0, &(0x7f0000000100)) 23:34:49 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_STATION(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000300)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MAC={0xa, 0x6, @device_b}]}, 0x28}}, 0x0) [ 1063.460087] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1063.460087] [ 1063.489129] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1063.489129] 23:34:49 executing program 4: r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000000e40)=ANY=[@ANYBLOB="b702000003000000bfa30000000000000703000000feffff7a0af0fff8ffffff79a4f0ff00000000b7060000ffffffff2d6405000000000065040400010000000404000001007d60b7030000000000006a0a00fe00010000850000000d000000b7000000000000009500000000000000496cf2827fb43a431ca711fcd0cdfa146ec56175037958e271f60d25b7937f02c8695e5a1b24df41dc10d1e8bf076d83923dd29c034055b67dafe6c8dc3d5d78c07fa1f7e655ce34e4d5b318e2ec0e0700897a74a0091ff110026e6d2ef831ab7ea0c34f17e3ad6ef3bb622003b538dfd8e012e79578e51bc53099e90fbdb2ca8eeb9c15ab3a14817ac61e4dd11183a13477bf7e060e3670ef0e789f93781965f1328d6704902cbe7bc04b82d2789cb132b8667c21476619f28d9961b63e1a9cf6c2a660a1fe3c184b751c51160fbce841f8a97be6148ba532e6ea09c346dfebd31a08b32808b80200000000009dd27080e71113610e10d858e8327ef01fb6c86adac12233f9a1fb9c2aec61ce63a3462fd50117b89a9ab359b4eea0c6e95767d42b4e54861d0227dbfd47d8576a3f7f3deadd7130856f756436303767d2e24f29e5dad9796edb697a6ea0180aabc18cae2ed4b4390af9a9ceafd07ed00b0000002cab554ad029a119ca3c972780870014601c3c975d5aec84222fff0d7216fdb0d3a0ec4be3e563112f4b39501aafe234870072858dc06e7c337642d3e5a815232f5e16c1b30c3a2a71bcffc2cc788bee1b47683db01a469398685211bbae0e7313bff5d4c391ddece00fc772dd6b4d4de2a41990f05ca3bdfc92c88c5b8dcdcc22ee17476d738992532a0b46c65a26db38bfae3ac2a9f5a699593f084419cae0b4183fb01c73f99857399537f5dc2acb72c7eae993fc9eb22d130665b6341da114f08cd0509d380578673f8b6e74ce23877a6b24db0e067345562942fa629fbef2461c96a08707671315c302fae29187d4f5c06a960fd37c10223fdae7ed04935c3c90d3add8eebc8619d73415e6adcda2130f5011e48455b588b90dfae158b94f50adab988dd8e12baf5cc9398c88607a08009c2977aab37d9a44cfc1c7b400000000cc0000fa47742f6c5b9c4b11e7d7262a1457c39495c826b956ba859ac8e3c177b91bd7d5ca1666fe2f3ced8468911806e8916dc15e21644db60c2499d5d16d7d915836ab26c169482008ef069dc42749289f854797f2f900c2a12d8c38a967c1bbe09315c29877a331bcc87dc3addb08141bdee5d27874b2f663ddeef0005b3d96c7aabf4df517d90bdc01e73835d5a3e1a9e90d76c1993e0799d4894ee7f8249dc1e3428d2129369ee1b85afa1a5be5f6eb2eea0d0df414b315f651c8412392191fa83ee830548f11e1038debd64cbe359454a3f2239cfe35f81b7aded448859968ff0e90500d0b07c0dd00490f167e6d5c1109681739dc33f75b20428d6474a0a91ee90b8de802c6b538622e6bbcb80f87b415263c401e64ed97116ee0c1fa9185bc68477b8521cb0c69a2f75409000000000000001d695c4559b82cabac3cccadc1e1c19af4e03020abf5ff0433d660f20898d2a045d009a0ffb20a77c9af2b80c05184a66d30bbea2ca45a4d6d6d1e6e79aef42355a500587b603306a5af8d867d80a07f10d82eafb03062e95196d5e3b854b1c8c768c001496fa99ce5e7194123e918914a71ad5a8521fb956d05000000719b55b3abb6bba3d113a680a8d46fe074c83fbe378a3889e8145b2eaceab05ef932c6e4f8ef0ed0d818a7b76d839cf3c63ebb4380b168c38fa32e49563cfee3a7f0fc18bfa32c418cef875fb49e2989177a1bcd1e30280bc586e79a5dd8076c248e7d6e97b3ce267dd4e27b6ef206660090bb2164474cef378f97ca33fccf363361dcdba10c1547053453d0c9aec91a24079b21d52fb5516bf0c28ef37aa76442f6083dc99cd61afaf6be45d7b00d3639f2f10ac2d5c759c3e5468f5874c24411d415b6b085fb73a2c7c3852e0e658ffeb4e863428a792bee94f6cd895424360e0464f9d7ea425f2fa6aac029d15af607ad83532ff181c985f54b39370c06e63055b4d6a36fa98a44e379d2bccf977c3e88538f406b598307c9912fb097601f3f88a2ca6fd1f9320cfe7fc8e9f7f15f02e177ce23f43a154b42e26f037e8a01377cbd3f509e6e54b7fc96d6a706008ed3e14a0c9ba9c2a589ac5d8ad67a65e9a44c576dc24452eaa9d819e2b04bdd1c000000000000000000000000000000005333c6199c12dcd92689192727a7267c47cf897853d160100b39b613faefe16bed1fc105cddd77ab929b837d54aa17fa9fbdc2bdc0e98ae2c3f23a6131e2879f0484ee3bfe30b92dd493be66c2242f8184733b80ba28e824910844df3108d5bb2f89049c5f6d63956995747639964217aacfe548bc869098aa8e07e51dbc9e2d4db3c5f79fd355222ec2a00cf7f2ccd6dd6d2dc2a815d8314221a5472f1318a9dfbec5a759579caf3262129b14e99040b5d91398e17df85c25ccae973eecc7d187168d5c9cd848d566cc175876410c02889c927da38d83314480b15e23138c5b877a72bd4cf74a299df4fbfc8e6ea96939f15d254d9033c5a45706bda78ab602000000000000000000000000000000000000000000fa80459bb5d3c2f325288c2cc2734810e7ef209f233ad097c30ba8c0f8555f8b304a1acfb009a7f2ee0d0380a2f2a8795172af094a2751c35f807949973491c5b22ad1e9d89d21d7f30e51f686b176eb732565750250ebcc9a40a6c909ec9293952e9ac5a81b9627c000"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) preadv(r1, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000080)={r0, 0x18000000000002a0, 0xfe, 0xf000, &(0x7f0000000100)="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", 0x0, 0xfe, 0x60000000}, 0x2c) 23:34:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030b00020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600fffffffb00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:49 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000000), 0x4) 23:34:49 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000061000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:49 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x154}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 1063.819111] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1063.819111] [ 1063.863854] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1063.863854] 23:34:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600fffffdfc00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:50 executing program 4: semctl$SEM_STAT_ANY(0x0, 0x0, 0x14, &(0x7f0000000000)=""/143) 23:34:50 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_ifreq(r0, 0x8919, &(0x7f0000000000)={'vxcan1\x00', @ifru_addrs=@ax25={0x3, @netrom}}) [ 1063.987216] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1063.987216] [ 1064.145976] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1064.145976] [ 1064.212864] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1064.212864] 23:34:50 executing program 0: sendmsg$RDMA_NLDEV_CMD_DELLINK(0xffffffffffffffff, &(0x7f0000000800)={&(0x7f0000000740)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000007c0)={&(0x7f0000000780)={0x30, 0x1404, 0x300, 0x70bd2b, 0x25dfdbfe, "", [@RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x2}, @RDMA_NLDEV_ATTR_DEV_INDEX={0x8, 0x1, 0x1}]}, 0x30}, 0x1, 0x0, 0x0, 0x48001}, 0x90) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0}, &(0x7f00000000c0)=0xc) statx(0xffffffffffffffff, &(0x7f0000000140)='./file0\x00', 0x100, 0x800, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="4a465331010000006076000000000000001000000c00030000420000090000b80f200000000920100000000000000000040000001800000002e33e95fa185c861913d81ed8bc8274f77412db06d164ba295a60aa03f5", 0xffffffffffffff2d, 0x8000}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB='euid>', @ANYRESDEC=0xee00, @ANYBLOB=',uid<', @ANYRESDEC=r0, @ANYBLOB=',smackfstransmute=jfs\x00,euid>', @ANYRESDEC=r1, @ANYBLOB=',euid=', @ANYRESDEC=r1, @ANYBLOB=',uid<', @ANYRESDEC=r0, @ANYBLOB="2c6175646974dc3627db050012f9cc053d4144c6cdb72cd4"]) chroot(&(0x7f0000000040)='./file0\x00') r2 = syz_mount_image$qnx4(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x100000001, 0x1, &(0x7f00000003c0)=[{&(0x7f00000004c0)="66bb45733d4c676f058615e6f8a13201b7c308112da32adbebee3ee8d42e8993fb88e4dcd411d2bec825f5c48618be78440de68f75d7f276142e009298eb3a990bb7c2bf7ce727908cd877c223885f840412ee5603daf688541598f85899ae6b88992e7d77806c334e9159f0", 0x6c, 0x9}], 0x10000, &(0x7f0000000540)={[{'jfs\x00'}, {'jfs\x00'}], [{@smackfshat={'smackfshat', 0x3d, 'jfs\x00'}}, {@hash}, {@fowner_lt={'fowner<', r0}}, {@dont_measure}, {@smackfsdef={'smackfsdef', 0x3d, '+[\\./$..#,&]'}}, {@fowner_lt={'fowner<', r1}}, {@audit}]}) statx(r2, &(0x7f0000000600)='./file0\x00', 0x4000, 0x8, &(0x7f0000000640)) 23:34:50 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000071000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:50 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030f00020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:50 executing program 4: r0 = semget(0x1, 0x0, 0x0) r1 = semget(0x1, 0x0, 0x0) semtimedop(r1, &(0x7f0000000180)=[{0x0, 0x0, 0x3000}], 0x1, 0x0) semop(r0, &(0x7f0000000000)=[{0x0, 0x0, 0x1000}], 0x1) 23:34:50 executing program 1: futex(0x0, 0x8c, 0x1, &(0x7f0000000080)={0x0, 0x3938700}, &(0x7f00000000c0), 0x0) 23:34:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600fffffdfd00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:50 executing program 1: socketpair(0x2, 0x0, 0x40000004, &(0x7f0000000040)) [ 1064.446805] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1064.446805] 23:34:50 executing program 4: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) mmap$usbmon(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x12, r0, 0x0) [ 1064.496790] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1064.496790] 23:34:50 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000000c0), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000100)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "8bd3c5d7024d3347c067dd27beb771de4a6cc51e222c5bc4485fd4d1bf48bbc1cfd1048ec86ae6490ef4107aa3fb0a21dc4af48a8a7faae3632cbcf2ac796d41", "d99f7f842e739e7eb0bd33ac7f10095569d981322884970a6bbfd308e344ebeb"}) 23:34:50 executing program 1: syz_open_dev$dri(&(0x7f0000000000), 0x0, 0x4281) [ 1064.560202] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1064.560202] 23:34:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600fffffffd00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:50 executing program 1: r0 = semget(0x1, 0x0, 0x0) semtimedop(r0, &(0x7f0000000180)=[{}], 0x1, &(0x7f00000001c0)) [ 1064.669024] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1064.669024] 23:34:51 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000081000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:51 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00031000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:51 executing program 0: r0 = syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="4a465331010000006076000000000000001000000c00030000020000200000000020000000092010000000555ccc83060d479dd9f43e0bdf9f3d7ee4050ec100d7d8d4396b64a1dea37bb9a8b6cff3d91e35f2db50f3275440e41a1ecf8b96219e5f7a91469ddac493", 0x69, 0x8000}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="00da53018ed99413a015965e492dc2dfb43e7f00000000000000004285605f8d57d2192c017429313aada8832da6d40659b7e6e78e2cb81c6e2d25b76d648c7c0700be7fe255400e"]) preadv(r0, &(0x7f00000001c0)=[{&(0x7f00000000c0)}], 0x1, 0x3, 0x80000000) openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x1794c0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x4000, 0x80) 23:34:51 executing program 1: r0 = epoll_create(0x80) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000080)) 23:34:51 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f00000002c0)=@newspdinfo={0x1c, 0x24, 0x1, 0x0, 0x0, 0x0, [@XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x1c}}, 0x0) [ 1064.843458] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1064.843458] 23:34:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600fffffffe00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1064.927434] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1064.927434] 23:34:51 executing program 4: openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x80100, 0x0) 23:34:51 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xe0, 0xe0, 0x6, [@const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0, 0x0, 0x0]}}, 0x0, 0xfe}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 1065.037081] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.037081] 23:34:51 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0375b2edfc10afb3a794dd55181c010ced6ec409f2e4b18816477cf2c3e611aff997b676451813cfabbf84b3e3d2151c0c7bf90d4489c64835a7c58aa8286764acb02e8729d0a68a0874494cc002eb37ef8b03d4bb0869ad00386f03cd146e40803ef324aa0f6799ba0d59c05468cd08c58f3dcac93d0a482f6141d57e88b19beebfbcfe9d0000"]) 23:34:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_CANCEL_REMAIN_ON_CHANNEL(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000040)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x35}]}, 0x28}}, 0x0) 23:34:51 executing program 1: clock_getres(0x0, &(0x7f0000000980)) [ 1065.164657] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.164657] [ 1065.184405] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.184405] 23:34:51 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00032300020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:51 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000091000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:51 executing program 0: r0 = syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r2, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r2, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10) splice(r1, 0x0, r2, 0x0, 0x30009, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) fstat(r3, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r4, r4, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x40, &(0x7f0000000140)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@afid={'afid', 0x3d, 0x3dda}}, {@access_uid={'access', 0x3d, r4}}, {@debug={'debug', 0x3d, 0xffffffff}}, {@access_user}, {@nodevmap}], [{@hash}, {@subj_role={'subj_role', 0x3d, 'jfs\x00'}}]}}) 23:34:51 executing program 4: socketpair(0x1, 0x0, 0x7, &(0x7f0000000100)) 23:34:51 executing program 1: futex(0x0, 0x6, 0x0, &(0x7f0000000080), 0x0, 0x0) [ 1065.359068] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.359068] 23:34:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000fff00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:51 executing program 4: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) lseek(r0, 0x0, 0x3) 23:34:51 executing program 1: r0 = epoll_create(0x9) epoll_pwait(r0, &(0x7f0000000080)=[{}], 0x1, 0x1f, 0x0, 0x0) 23:34:51 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000b1000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1065.480536] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.480536] 23:34:51 executing program 4: r0 = epoll_create(0x80) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000180)) 23:34:51 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20000004, &(0x7f0000b63fe4), 0x1c) [ 1065.619154] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.619154] [ 1065.633109] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.633109] 23:34:51 executing program 4: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_SUBVOL_CREATE_V2(r0, 0x50009418, 0x0) 23:34:52 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00038202020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:52 executing program 1: syz_open_dev$sg(&(0x7f0000000040), 0x6, 0x0) [ 1065.753246] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.753246] [ 1065.890057] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.890057] [ 1065.931988] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.931988] 23:34:52 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) 23:34:52 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000c1000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:52 executing program 1: syz_mount_image$qnx4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, 0x0) 23:34:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600001fffff00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:52 executing program 0: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000900000000200000000920100000000000000000040000001800000002", 0x39, 0x8000}], 0x0, &(0x7f0000000040)) pipe(&(0x7f0000000080)={0xffffffffffffffff}) r1 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r1, &(0x7f0000000180)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) connect$inet(r1, &(0x7f00000001c0)={0x2, 0x0, @multicast1}, 0x10) splice(r0, 0x0, r1, 0x0, 0x30009, 0x0) setxattr$trusted_overlay_nlink(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), &(0x7f0000000240)={'L-', 0x7fff}, 0x16, 0x2) openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000280), 0x40300, 0x0) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8, 0x80010, r0, 0x84b80000) 23:34:52 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030003020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:52 executing program 1: memfd_create(&(0x7f0000000040)='nbc\xe1HWbxy\xd3\xf8\x8f\x01\x96\xd8\xbe\x02\x1c\x05\x15\x9c\xe1D\x15\x93\xd21\x0fJ\t\xa2\xc5\x98\xa3\xf6\xc8\xf2\\\xe5KP\x8c\xe7+\x9b\xc2\xe9\xf1Y4+\xff5\xa3\xd2)\xf6 \xd1Q\xa2H|\x10\x84\xce\x17\x1a\xa3\x89\xa6\xb4\x01\xfa\x91\xe7\xa8m\xcc#\t\xaa\xf1\xba\xa3J\xad\xcb+u*\xd8\x04P\x17\xa5\r\x8b\xa1K\xea \xbf\xa6\\\x81\xe7\xec\x80', 0x0) 23:34:52 executing program 4: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm], 0x1) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) [ 1066.323562] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1066.323562] [ 1066.347612] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1066.347612] 23:34:52 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x806, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) 23:34:52 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x9, 0x2) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000005c0)={0x0, 0x3, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c71a23f7"}}) 23:34:52 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001540)={'sit0\x00', &(0x7f00000014c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @empty}}) 23:34:52 executing program 4: syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x20002) 23:34:52 executing program 1: fchmodat(0xffffffffffffffff, &(0x7f0000000380)='./file0\x00', 0x0) 23:34:52 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000d1000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:52 executing program 1: r0 = socket(0xa, 0x5, 0x0) getsockname(r0, 0x0, &(0x7f0000000080)) [ 1066.541355] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1066.541355] [ 1066.554073] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1066.554073] 23:34:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000080ffff00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1066.878715] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1066.878715] [ 1066.990628] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1066.990628] 23:34:53 executing program 0: getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, 0x0, 0x0) 23:34:53 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) 23:34:53 executing program 1: socket(0x1e, 0x0, 0x1ff) 23:34:53 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030005020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:53 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000f1000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:53 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600fcfdffff00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:53 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880), 0x8040, 0x0) 23:34:53 executing program 4: syz_open_dev$usbfs(&(0x7f0000000100), 0x0, 0x0) [ 1067.190024] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1067.190024] 23:34:53 executing program 0: syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) 23:34:53 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030006020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1067.253333] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1067.253333] 23:34:53 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{0x98}}) 23:34:53 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000700), r0) 23:34:53 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_RECSRC(r0, 0xc0044dff, 0x0) 23:34:53 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000bc0), 0x200402, 0x0) 23:34:53 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000231000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:53 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x202, 0x0) [ 1067.442312] Unknown ioctl -1073459713 [ 1067.448255] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1067.448255] [ 1067.460227] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1067.460227] 23:34:53 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600fdfdffff00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:53 executing program 1: r0 = creat(&(0x7f0000000300)='./bus\x00', 0x0) io_setup(0x81, &(0x7f0000000040)=0x0) r2 = creat(&(0x7f0000000100)='./bus\x00', 0x0) ftruncate(r2, 0x208200) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r3, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/self/exe\x00', 0x0, 0x0) preadv(r4, &(0x7f0000000280), 0x18, 0xd9f, 0x0) fcntl$setstatus(r0, 0x4, 0x44c00) io_submit(r1, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0xc, 0x1, 0x0, r0, &(0x7f0000000080)='\n', 0x1}]) 23:34:53 executing program 0: syz_genetlink_get_family_id$l2tp(0xfffffffffffffffe, 0xffffffffffffffff) 23:34:53 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) 23:34:53 executing program 4: syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) [ 1067.614945] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1067.614945] [ 1067.635378] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1067.635378] 23:34:53 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030007020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:53 executing program 0: bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x6) 23:34:53 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000001a80)={0x3d0, 0x0, 0x0, "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"}) 23:34:53 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000002f00000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:53 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)={{}, {0x3}}) 23:34:53 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000240), 0x108103, 0x0) 23:34:54 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f00000000c0), 0x0, 0x2) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000180)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "65609a7e"}, 0x0, 0x0, @userptr}) [ 1067.785877] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1067.785877] 23:34:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076007fffffff00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_TP_METER_CANCEL(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0, 0xffffffffffffffb6}}, 0x0) 23:34:54 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) write$vhost_msg(r0, 0x0, 0x0) 23:34:54 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_TEMPO(r0, 0xc02c5341, &(0x7f0000000040)) 23:34:54 executing program 1: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$wireguard(&(0x7f00000003c0), r0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000c40), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000d80), r0) [ 1067.908587] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1067.908587] 23:34:54 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030009020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:54 executing program 0: openat$sndseq(0xffffffffffffff9c, &(0x7f00000001c0), 0x92c0) 23:34:54 executing program 4: syz_mount_image$nfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000002100)=[{&(0x7f0000000e80)="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", 0xffa, 0x6}], 0x0, 0x0) 23:34:54 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000bf00000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1068.019341] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.019341] 23:34:54 executing program 0: r0 = openat$vmci(0xffffffffffffff9c, &(0x7f0000000100), 0x2, 0x0) ioctl$IOCTL_VMCI_NOTIFICATIONS_RECEIVE(r0, 0x7a6, 0x0) 23:34:54 executing program 4: openat$vmci(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) 23:34:54 executing program 1: r0 = fork() process_vm_writev(r0, &(0x7f0000001b00)=[{&(0x7f0000000040)=""/219, 0xdb}], 0x1, &(0x7f00000017c0)=[{&(0x7f0000001380)=""/111, 0x6f}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) [ 1068.141119] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.141119] [ 1068.150515] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.150515] 23:34:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076008cffffff00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:54 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x9, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0x0, 0x3}) 23:34:54 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f00000001c0)={{}, 'port0\x00'}) 23:34:54 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000b020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:54 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) bpf$BPF_GET_PROG_INFO(0xf, 0x0, 0x0) 23:34:54 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_GET_PCI(r0, 0x5387, 0x0) 23:34:54 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000000040c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:54 executing program 0: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00'}) [ 1068.355242] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.355242] 23:34:54 executing program 1: openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f00000003c0), 0xffffffffffffffff) 23:34:54 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000340), 0x801, 0x0) 23:34:54 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x4, 0x0, 0x0, "34e1be0c"}) 23:34:54 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000f020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1068.564906] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.564906] [ 1068.609017] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.609017] [ 1068.696248] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.696248] [ 1068.715753] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.715753] 23:34:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760097ffffff00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:54 executing program 4: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x40000) 23:34:54 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xa5aef7f3229ddd55, 0x7800}}) 23:34:54 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_freezer_state(r1, &(0x7f00000004c0), 0x2, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000100)={0x0, 0x0, {0x28, 0x27, 0xf, 0x1e, 0x8, 0x4, 0x2, 0x131, 0x1}}) ioctl$RTC_AIE_OFF(r0, 0x7002) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat$cgroup_freezer_state(r2, &(0x7f00000004c0), 0x2, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000040), r2) r3 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x101000, 0x0) ioctl$RNDADDTOENTCNT(r3, 0x40045201, &(0x7f00000000c0)=0x1000) 23:34:54 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000000080c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:55 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030020020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:55 executing program 1: syz_mount_image$qnx4(&(0x7f00000000c0), 0x0, 0x0, 0x1, &(0x7f0000000240)=[{0x0, 0x0, 0xcfd}], 0x0, &(0x7f0000000280)={[{'/dev/dlm-control\x00'}, {}]}) clock_gettime(0x0, 0x0) 23:34:55 executing program 0: add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, &(0x7f0000000080)="9f84", 0x2, 0xfffffffffffffffb) 23:34:55 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000186180c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:55 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, &(0x7f0000000180), &(0x7f00000001c0)=0x4) [ 1068.891682] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.891682] [ 1068.911720] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.911720] 23:34:55 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000040)={{}, 'port0\x00'}) 23:34:55 executing program 0: ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, &(0x7f0000000140)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x4, 0x0, 0x0, 0x0, 0x2, 0x0, "c1054772"}, 0x3, 0x3, @planes=0x0, 0x4ac}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) [ 1069.117015] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.117015] [ 1069.130892] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.130892] 23:34:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600f0ffffff00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:55 executing program 4: socketpair(0x3, 0x0, 0x7fffffff, 0x0) 23:34:55 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000040)={0x0, 0x59}) 23:34:55 executing program 0: r0 = fork() process_vm_writev(r0, &(0x7f0000002ac0)=[{&(0x7f0000002680)=""/230, 0xe6}, {&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000004f80)=""/167, 0xa7}], 0x3, &(0x7f0000002a00)=[{&(0x7f0000002b40)=""/107, 0x6b}, {&(0x7f0000002c80)=""/4096, 0x1000}], 0x2, 0x0) 23:34:55 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030023020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:55 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000001861c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:55 executing program 1: syz_mount_image$qnx4(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000680)='g@', 0x2, 0x7fffffff}], 0x0, 0x0) 23:34:55 executing program 0: ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) waitid(0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0) 23:34:55 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000200c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:55 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_PVERSION(r0, 0x80045300, &(0x7f0000000100)) 23:34:55 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x0, &(0x7f0000000880), 0x0, &(0x7f00000008c0)={[{@jqfmt_vfsv0}]}) [ 1069.396297] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.396297] [ 1069.429692] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.429692] 23:34:55 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f00000009c0), 0x43, 0x0) [ 1069.502503] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.502503] 23:34:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600f4ffffff00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:55 executing program 1: r0 = syz_open_dev$ndb(&(0x7f0000000080), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, 0x0) 23:34:55 executing program 0: socket(0x15, 0x5, 0x1) 23:34:55 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003003f020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:55 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, &(0x7f0000000000)) 23:34:55 executing program 4: openat$null(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0) 23:34:55 executing program 0: syz_open_dev$dri(&(0x7f00000001c0), 0x1, 0x0) 23:34:55 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000186200c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:55 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x0) [ 1069.708100] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.708100] [ 1069.723382] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.723382] 23:34:56 executing program 0: pselect6(0x0, 0x0, &(0x7f0000000500), &(0x7f0000000540), &(0x7f0000000580), &(0x7f0000000600)={&(0x7f00000005c0)={[0x8]}, 0x8}) 23:34:56 executing program 1: r0 = fork() ptrace$poke(0xffffffffffffffff, r0, 0x0, 0x0) 23:34:56 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={0x0}}, 0x24000081) [ 1069.863072] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.863072] [ 1069.878363] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.878363] 23:34:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600f5ffffff00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:56 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockname(r0, 0x0, &(0x7f0000000080)) 23:34:56 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000540)={'ip6tnl0\x00', 0x0}) 23:34:56 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030040020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:56 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) sendmsg$BATADV_CMD_GET_ROUTING_ALGOS(r0, 0x0, 0x0) 23:34:56 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000186240c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:56 executing program 0: syz_open_dev$usbfs(&(0x7f0000000100), 0x0, 0x351000) 23:34:56 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "84b3ad74190226aaee58ff04fc92b69b2733ca9ce4651e437005a25c1a0420e1419e9dac29437808ec2b7132d417d6306a13522a492009092bb08f8dcb622ce8"}, 0x48, 0xffffffffffffffff) keyctl$update(0x2, r0, &(0x7f0000000140)="8a", 0x1) 23:34:56 executing program 4: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x40, 0x0) 23:34:56 executing program 0: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) fork() [ 1070.155907] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1070.155907] 23:34:56 executing program 4: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$SOUND_MIXER_WRITE_RECSRC(r0, 0xc0044dff, &(0x7f0000000080)=0x44) 23:34:56 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000186d80c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600f6ffffff00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:56 executing program 1: openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) [ 1070.248318] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1070.248318] 23:34:56 executing program 4: r0 = gettid() process_vm_writev(r0, &(0x7f0000000140)=[{&(0x7f0000000040)=""/245, 0xf5}], 0x1, &(0x7f0000001380)=[{&(0x7f0000000180)=""/91, 0x5b}], 0x1, 0x0) [ 1070.366212] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1070.366212] [ 1070.425015] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1070.425015] 23:34:56 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030282020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:56 executing program 1: openat$md(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) 23:34:56 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r0, 0x40605346, &(0x7f0000000000)) 23:34:56 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000186e00c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600fbffffff00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:56 executing program 4: socketpair(0x1e, 0x0, 0x7b3b, 0x0) 23:34:56 executing program 0: fanotify_mark(0xffffffffffffffff, 0x42, 0x0, 0xffffffffffffffff, 0x0) 23:34:56 executing program 1: r0 = socket(0xa, 0x5, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, &(0x7f0000000040)) 23:34:56 executing program 4: socket(0xa, 0x1, 0x6) [ 1070.623086] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1070.623086] 23:34:56 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_CLIENT(r0, 0x404c534a, &(0x7f00000001c0)) 23:34:56 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, 0x0) 23:34:56 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000200000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1070.723144] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1070.723144] [ 1070.736439] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1070.736439] [ 1070.792837] Unknown ioctl -1060088316 [ 1070.867445] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1070.867445] 23:34:57 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030fff020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:57 executing program 1: syz_mount_image$reiserfs(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x0, &(0x7f0000000880), 0x0, &(0x7f00000008c0)={[{@tails_small}]}) 23:34:57 executing program 4: waitid(0x0, 0x0, 0x0, 0x40000003, 0x0) 23:34:57 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000300), 0x101800, 0x0) 23:34:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600fdffffff00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:57 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000002f00000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:57 executing program 1: perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x3, 0x6, 0xc0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x3) syz_mount_image$qnx4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, &(0x7f0000000280), 0x10000, &(0x7f00000002c0)={[{'@]\\+-@\'(\x00'}, {}, {','}, {')'}], [{@obj_role}, {@pcr}, {@obj_user}]}) perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext={0x8, 0x7}, 0xa04, 0x10000, 0x9, 0x5, 0x81c1, 0x4637, 0x0, 0x0, 0x9, 0x0, 0x3f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) 23:34:57 executing program 4: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000440)={'ip6gre0\x00', 0x0}) 23:34:57 executing program 0: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000080)={'sit0\x00', &(0x7f0000000000)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @loopback}}) 23:34:57 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x280041, 0x0) [ 1071.141434] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.141434] 23:34:57 executing program 1: syz_genetlink_get_family_id$nl80211(&(0x7f0000000900), 0xffffffffffffffff) 23:34:57 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000040)={0x4}) [ 1071.248989] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.248989] [ 1071.249130] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.249130] [ 1071.430747] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.430747] 23:34:57 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000040000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:57 executing program 4: syz_mount_image$qnx4(&(0x7f0000000080), 0x0, 0x0, 0x0, 0x0, 0xa22000, 0x0) syz_mount_image$reiserfs(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x0, &(0x7f0000000880), 0x0, &(0x7f00000008c0)={[{@jqfmt_vfsv0}, {@tails_small}], [{@fsmagic}]}) 23:34:57 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB='H'], 0x2c}}, 0x0) 23:34:57 executing program 1: openat$tun(0xffffffffffffff9c, &(0x7f0000000980), 0x0, 0x0) 23:34:57 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000bf00000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600feffffff00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:57 executing program 0: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@mss={0x2, 0x81}], 0x1) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={0x0}, 0x1, 0x0, 0x0, 0x2000c04c}, 0x24000081) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) socketpair(0x0, 0x0, 0x0, &(0x7f0000000500)) 23:34:57 executing program 4: syz_open_dev$dri(&(0x7f0000000080), 0x20, 0x0) [ 1071.570637] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.570637] 23:34:57 executing program 1: mmap$usbfs(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x2) [ 1071.615218] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.615218] 23:34:57 executing program 1: syz_mount_image$jfs(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000001500), 0x0, &(0x7f0000001580)={[{@uid={'uid', 0x3d, 0xee01}}]}) 23:34:57 executing program 4: syz_mount_image$qnx4(0x0, &(0x7f00000001c0)='./file0\x00', 0x180, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="0bf177ba478384d3396c9028347779e3e233a54b25637d43e6bec9fe742d6ecf60fe9f711719d1c55b46e20cf79f70ebe9be9237f7b8361abfdae6125c53068ce6", 0x41, 0x7}], 0x0, &(0x7f00000002c0)={[{}], [{@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x65], 0x2d, [0x0, 0x31]}}}]}) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, &(0x7f0000001c40)={0x0, @in={{0x2, 0x4e23, @loopback}}}, 0x84) 23:34:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000020001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1071.727996] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.727996] 23:34:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000100000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:58 executing program 0: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000001800)) 23:34:58 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000000b000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:58 executing program 1: r0 = openat$nullb(0xffffffffffffff9c, &(0x7f0000001880), 0x0, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(r0, 0xc0206434, 0x0) 23:34:58 executing program 4: openat$sndseq(0xffffffffffffff9c, 0x0, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f00000003c0), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000c40), 0xffffffffffffffff) 23:34:58 executing program 0: socketpair(0x28, 0x0, 0x401, 0x0) 23:34:58 executing program 1: openat$vsock(0xffffffffffffff9c, 0x0, 0x109240, 0x0) [ 1071.909214] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.909214] [ 1071.916674] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.916674] 23:34:58 executing program 0: syz_mount_image$qnx4(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) 23:34:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030028000000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1071.978663] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.978663] 23:34:58 executing program 1: add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) 23:34:58 executing program 4: pselect6(0x40, &(0x7f0000000940), 0x0, &(0x7f00000009c0)={0x10000}, &(0x7f0000000a00)={0x77359400}, &(0x7f0000000a80)={&(0x7f0000000a40), 0x8}) [ 1072.048426] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1072.048426] 23:34:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000007f1d674c9000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:58 executing program 0: syz_mount_image$vxfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f0000000840)="d5", 0x1}, {&(0x7f00000009c0)='b', 0x1, 0xfffffffffffffffb}], 0x0, 0x0) [ 1072.113771] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1072.113771] 23:34:58 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x9, 0x2) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f00000003c0)={0x0, 0x47524247, 0x0, @stepwise}) 23:34:58 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TCP_QUEUE_SEQ(r0, 0x6, 0x15, &(0x7f0000000100), 0x4) 23:34:58 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) 23:34:58 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000fff000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:58 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) [ 1072.289105] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1072.289105] 23:34:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030002020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:58 executing program 0: syz_open_dev$ndb(&(0x7f0000000080), 0x0, 0x881801) 23:34:58 executing program 4: socketpair(0x23, 0x0, 0x80000004, 0x0) 23:34:58 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)={0x0, "09aa146e579843fe1577c167c822f208ac5956da6eb7fa3ff7cb2db3ef397d44d5de33fff740cbf3df6f81e3725ea45e5e16ad2c0000f067406281741df6439b"}, 0x48, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) 23:34:58 executing program 0: socketpair(0x0, 0x80b, 0x0, 0x0) 23:34:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000004000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:58 executing program 4: add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000100)={0x0, "6e0018e1dfec6591aff4855a6e97e71d950f1be72b91626051945ca718fd9ff6332f22ba527813322bca2e1f4f4e51241e7fe8bebcf53524f0ddbeb5b03cf0a6"}, 0x48, 0xfffffffffffffffd) 23:34:58 executing program 1: syz_open_dev$loop(&(0x7f0000001c40), 0x0, 0x103802) 23:34:58 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0xf8}}) [ 1072.546235] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1072.546235] 23:34:58 executing program 4: syz_open_dev$dri(&(0x7f0000000300), 0x0, 0x440800) 23:34:58 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001002000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:58 executing program 1: syz_read_part_table(0x8001, 0x5, &(0x7f0000000380)=[{0x0}, {&(0x7f00000000c0)="e478047c917caf82d37f7f01a4bd8d234849f041a943c999125dc8ae6d330813d3b11f7c428a9e8bcb7491f565a374e567e92a2486385422a0d05ec92619966c647926348169c8f514d2188b88bef2bb9e4b6cfbb6ae3f746338cf2b332b5f39b9db2fe8ca8c977562b6970759ec9e4ecc1d6f62f94907f5e4020ee4274888215277e54c4e81d1039f32e1bbc3b6385235726e6610c704ee6cf5c14df737933c3187617808b12f", 0xa7, 0xfffffffffffffff8}, {&(0x7f0000000180)="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", 0xfe, 0xefc}, {&(0x7f0000000280)="25e2fdbb93829cf1aaf344ab5df0f5d14276de9b31a7a17b30d70bb6a30a49056668b61d4ea7817a773142065d08cc58b6b04a17e1eac2054634971688223dce1ae037722954d149120c1aeaa809bb8e0bbbdc9a31b7a57e9f889fc314fe30d2ad8e66394557f30ad9f44d60", 0x6c, 0x1}, {&(0x7f0000000300)="dfd1b1e8358a07761857cf32b0f69d61414a7f3141115a2768359c0d3611edd94bf59b77f6a229dbc48607c566678b685251827860ca5df2aa74fcbd9c17109ca40292e49aebb5942e", 0x49, 0xfffffffffffffe01}]) openat$hwrng(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 1072.653836] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1072.653836] 23:34:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030003020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:58 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000080), &(0x7f0000000040)=0x30) 23:34:58 executing program 4: r0 = socket(0xa, 0x5, 0x0) setsockopt$WPAN_WANTACK(r0, 0x0, 0x0, 0x0, 0x0) 23:34:58 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000180)) 23:34:59 executing program 1: r0 = socket(0x2b, 0x1, 0x0) setsockopt$RDS_FREE_MR(r0, 0x114, 0x3, 0x0, 0x0) [ 1072.840968] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1072.840968] 23:34:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000008000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:59 executing program 4: socketpair(0x22, 0x0, 0xfffffffb, 0x0) 23:34:59 executing program 0: openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_mount_image$qnx4(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000240)=[{0x0}], 0x0, &(0x7f0000000280)={[{'['}, {'/dev/dlm-control\x00'}, {'/dev/dlm-control\x00'}, {'/dev/dlm-control\x00'}]}) futimesat(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, &(0x7f0000000400)='./file0/file0\x00', 0x0) syz_mount_image$vxfs(&(0x7f00000007c0), &(0x7f0000000800)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000a40)=[{&(0x7f0000000840)="d56cd20f66223afc7589634cabdbf5d047c2f1d427fdfb31824cfa5a219dc4f5fe4c941c0666231ee466de066a5afb93449989bd194019cc61586f984ab777ad48b217ead9229cd477ce836b089592ca0d793f6f", 0x54, 0xffff}], 0x400, &(0x7f0000000ac0)={[{'^\xb2!:'}], [{@appraise}]}) 23:34:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r0) 23:34:59 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001003000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1072.984877] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1072.984877] 23:34:59 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) openat$cgroup_netprio_ifpriomap(r0, &(0x7f0000000000), 0x2, 0x0) 23:34:59 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000680)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c98a950d"}, 0x0, 0x0, @userptr}) 23:34:59 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030004020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:59 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup/syz1\x00', 0x200002, 0x0) 23:34:59 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0x14, &(0x7f0000000140)={&(0x7f0000000100)="a2", 0x1}}, 0x0) 23:34:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000000b000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:59 executing program 0: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000012c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) 23:34:59 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={&(0x7f0000000480), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}]}, 0x2c}}, 0x0) [ 1073.221755] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1073.221755] 23:34:59 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001004000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:59 executing program 0: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x7f, 0x3d, 0x6, 0x0, 0x4, 0x1224, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf7, 0x5, @perf_bp={&(0x7f0000000000), 0xc}, 0x10000, 0x2, 0x3, 0x3, 0xffffffff80000001, 0x1e, 0x2, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x2) r1 = perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x3, 0x6, 0xc0, 0x4, 0x0, 0x91, 0x2408, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x1, 0x5b2b}, 0x4000, 0x4, 0x1ff, 0x4, 0x7, 0x7, 0x8, 0x0, 0x4}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x3) r2 = syz_mount_image$qnx4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x180, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="0bf177ba478384d3396c9028347779e3e233a54b25637d43e6bec9fe742d6ecf60fe9f711719d1c55b46e20cf79f70ebe9be9237f7b8361abfdae6125c53068ce6aa45e10cf99c695d77f0bc66738d257820a9adab43", 0x56, 0x7}], 0x10000, &(0x7f00000002c0)={[{'@]\\+-@\'(\x00'}, {':#'}, {}, {'-,)%\'-,\'%\\'}, {','}, {'^\'/'}, {}, {')'}], [{@subj_type={'subj_type', 0x3d, '}:'}}, {@obj_role}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x8, 0x65, 0x37, 0x31, 0x35, 0x30, 0x65], 0x2d, [0x30, 0x31, 0x33, 0x33], 0x2d, [0x36, 0x60, 0x62, 0x61], 0x2d, [0x62, 0x35, 0x64, 0x34], 0x2d, [0x4e, 0x65, 0x39, 0x37, 0x34, 0x0, 0x65, 0x65]}}}, {@obj_user}, {@pcr={'pcr', 0x3d, 0x22}}, {@obj_user}]}) fchmodat(r2, &(0x7f0000000380)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x8, 0x2, 0x6, 0xff, 0x0, 0x80000001, 0x4cea1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x8, 0x7}, 0xa04, 0x10000, 0x9, 0x5, 0x81c1, 0x4637, 0x0, 0x0, 0x9, 0x0, 0x3f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) r4 = perf_event_open$cgroup(&(0x7f0000000540)={0x1, 0x80, 0x6, 0x8, 0x0, 0x5, 0x0, 0x1, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x1, @perf_bp={&(0x7f0000000500), 0x4}, 0x10, 0x81, 0x7fffffff, 0x7, 0x3f, 0x80000000, 0x40, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000005c0)='^\'/') ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x10000) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000001b80), 0x200, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000001c40)={0x0, @in={{0x2, 0x4e23, @loopback}}}, 0x84) 23:34:59 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000002880)={&(0x7f0000000340)=@ll, 0x80, &(0x7f0000002700)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) [ 1073.310107] nbd: must specify an index to disconnect [ 1073.319628] nbd: must specify an index to disconnect 23:34:59 executing program 1: select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x77359400}) [ 1073.353041] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1073.353041] 23:34:59 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) 23:34:59 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) 23:34:59 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030005020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000007f1d674c9040000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:59 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) 23:34:59 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001005000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:34:59 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_INFO(r0, 0xc08c5334, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) [ 1073.590543] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1073.590543] 23:34:59 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_LISTEN(r0, &(0x7f0000000180)={0x7, 0x8}, 0x10) 23:34:59 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)) 23:34:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000fff000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1073.692901] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1073.692901] 23:35:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030006020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:00 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) ioctl$vim2m_VIDIOC_STREAMOFF(r0, 0x40045612, &(0x7f0000000040)) 23:35:00 executing program 4: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockname(r0, &(0x7f00000000c0)=@sco, &(0x7f0000000140)=0x80) 23:35:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000002000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:00 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001006000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:00 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x280000, 0x0) ioctl$SCSI_IOCTL_DOORUNLOCK(r0, 0x5381) [ 1074.264124] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1074.264124] 23:35:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030007020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:00 executing program 0: r0 = fork() process_vm_writev(r0, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/213, 0xd5}], 0x1, &(0x7f00000007c0)=[{&(0x7f0000000480)=""/143, 0x8f}, {&(0x7f0000000540)=""/170, 0xaa}, {0x0}], 0x3, 0x0) 23:35:00 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000000), 0x4, 0x2) ioctl$vim2m_VIDIOC_S_CTRL(r0, 0xc008561c, &(0x7f0000000040)) 23:35:00 executing program 4: faccessat(0xffffffffffffffff, 0x0, 0xc0) [ 1074.425041] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1074.425041] 23:35:00 executing program 4: r0 = fork() process_vm_writev(r0, &(0x7f0000002ac0)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000004f80)=""/167, 0xa7}], 0x2, &(0x7f0000002a00)=[{&(0x7f0000002b40)=""/107, 0x6b}, {&(0x7f0000002940)=""/172, 0xac}], 0x2, 0x0) 23:35:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000003000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:00 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001007000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1074.470644] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1074.470644] 23:35:00 executing program 1: pselect6(0x40, &(0x7f0000000940), 0x0, &(0x7f00000009c0)={0x10000}, &(0x7f0000000a00)={0x77359400}, &(0x7f0000000a80)={&(0x7f0000000a40)={[0x7]}, 0x8}) 23:35:00 executing program 0: fchownat(0xffffffffffffffff, 0x0, 0xee01, 0xee01, 0x0) [ 1074.606606] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1074.606606] [ 1074.607611] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1074.607611] 23:35:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030008020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:00 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000bc0), 0x200402, 0x0) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r0, 0x0, 0x0) 23:35:00 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000280), 0x0, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000680)={0x0, 0x2, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "00b700"}, 0x0, 0x0, @userptr}) 23:35:00 executing program 0: socket(0x18, 0x0, 0x3f) [ 1074.733825] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1074.733825] 23:35:01 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001008000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:01 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000180), 0x0, 0x0) ioctl$BLKROTATIONAL(r0, 0x127e, &(0x7f00000001c0)) [ 1074.774884] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1074.774884] 23:35:01 executing program 1: syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) 23:35:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000004000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:01 executing program 0: kexec_load(0x0, 0x1, &(0x7f00000003c0)=[{0x0}], 0x0) [ 1074.859460] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1074.859460] [ 1074.874538] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1074.874538] 23:35:01 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f0000000000)={{0x80}}) 23:35:01 executing program 1: bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000240)={0xffffffffffffffff}, 0x4) 23:35:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030009020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:01 executing program 1: openat$hwrng(0xffffffffffffff9c, 0x0, 0x511100, 0x0) 23:35:01 executing program 0: syz_mount_image$qnx4(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x49000, &(0x7f0000000280)={[], [{@mask={'mask', 0x3d, 'MAY_EXEC'}}]}) 23:35:01 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) 23:35:01 executing program 1: r0 = socket$inet_smc(0x2b, 0x1, 0x0) setsockopt$inet_tcp_TLS_RX(r0, 0x6, 0x2, &(0x7f0000000040)=@ccm_128={{}, "e82bdb31512f3226", "c33313b6010b780e04e33f6ba2a1b566", "a69ce1c2", "b3520bf1f7fe61c5"}, 0x28) [ 1075.108710] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1075.108710] 23:35:01 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001009000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:01 executing program 4: syz_mount_image$qnx4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="06", 0x1, 0xffffffff}], 0x0, 0x0) 23:35:01 executing program 0: memfd_create(&(0x7f00000001c0)=')#.+$-.^:&\\+(\x00', 0x3) [ 1075.161442] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1075.161442] 23:35:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000005000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:01 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000840)=0xfffffffffffffffe, 0x4) 23:35:01 executing program 4: syz_mount_image$qnx4(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa22000, &(0x7f0000000300)) 23:35:01 executing program 0: syz_mount_image$qnx4(&(0x7f0000000180), 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, &(0x7f00000002c0)) [ 1075.310066] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1075.310066] 23:35:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000b020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:01 executing program 1: socketpair(0xa, 0x0, 0xf8a4, 0x0) 23:35:01 executing program 0: syz_open_dev$loop(&(0x7f0000001c40), 0x0, 0x0) 23:35:01 executing program 4: syz_mount_image$vxfs(&(0x7f00000007c0), &(0x7f0000000800)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000ac0)) 23:35:01 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000040)={0x0, 0x0, 0x82}) [ 1075.426039] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1075.426039] 23:35:01 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100b000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:01 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000100)={0x10001, 0x1, 0x1}) 23:35:01 executing program 4: setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(0xffffffffffffffff, 0x84, 0x6, 0x0, 0x0) 23:35:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000006000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1075.526418] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1075.526418] 23:35:01 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0}}, 0x0) [ 1075.630600] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1075.630600] [ 1075.661570] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1075.661570] 23:35:01 executing program 4: openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) 23:35:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000f020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:01 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "84b3ad74190226aaee58ff04fc92b69b2733ca9ce4651e437005a25c1a0420e1419e9dac29437808ec2b7132d417d6306a13522a492009092bb08f8dcb622ce8"}, 0x48, 0xffffffffffffffff) keyctl$update(0x2, r0, 0x0, 0x0) 23:35:02 executing program 4: syz_mount_image$reiserfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000580)={[{@usrjquota_file}]}) 23:35:02 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100c000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1075.800843] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1075.800843] 23:35:02 executing program 1: syz_genetlink_get_family_id$mptcp(&(0x7f0000000000), 0xffffffffffffffff) 23:35:02 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f00000000c0), 0x82c0, 0x0) 23:35:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000007000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1075.928371] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1075.928371] 23:35:02 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000001b80), 0x200, 0x0) 23:35:02 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000000)=0x3, 0x4) 23:35:02 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000380)=[{0x0, 0x0, 0xfffffffffffffff8}]) 23:35:02 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100d000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:02 executing program 1: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000080)={0x0, "84b3ad74190226aaee58ff04fc92b69b2733ca9ce4651e437005a25c1a0420e1419e9dac29437808ec2b7132d417d6306a13522a492009092bb08f8dcb622ce8"}, 0x48, 0xffffffffffffffff) [ 1076.063418] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1076.063418] [ 1076.096380] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1076.096380] 23:35:02 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030023020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:02 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000280)) 23:35:02 executing program 0: inotify_add_watch(0xffffffffffffffff, 0x0, 0x808) 23:35:02 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SYSTEM_INFO(r0, 0xc0305302, &(0x7f0000000000)) 23:35:02 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000280), 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f00000002c0)) 23:35:02 executing program 0: memfd_create(&(0x7f0000000000)='nbd\x00', 0x4) [ 1076.225028] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1076.225028] 23:35:02 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100f000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000008000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:02 executing program 4: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @mss={0x2, 0x81}, @window={0x3, 0x4, 0x1ff}], 0x3) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r1, 0x400, 0x70bd26, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8, 0x1, r2}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xab}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x22}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r1, 0x300, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x80000000}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2000c04c}, 0x24000081) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040014}, 0x4004000) syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r0) socketpair(0x1d, 0x0, 0x81, &(0x7f0000000500)) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)) 23:35:02 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000680)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c98a950d"}, 0x0, 0x0, @userptr}) [ 1076.314770] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1076.314770] 23:35:02 executing program 1: r0 = fork() process_vm_writev(r0, &(0x7f0000002180)=[{&(0x7f0000001080)=""/4096, 0x1000}, {0x0}], 0x2, &(0x7f00000022c0)=[{&(0x7f00000021c0)=""/198, 0xc6}], 0x1, 0x0) 23:35:02 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880), 0x20000, 0x0) 23:35:02 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000030000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:02 executing program 4: syz_mount_image$qnx4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001a00)=[{&(0x7f0000000700)='{', 0x1}, {&(0x7f0000000800)="c1", 0x1}, {&(0x7f0000001800)="ff", 0x1}], 0x0, 0x0) [ 1076.496311] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1076.496311] 23:35:02 executing program 0: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000100)={'syztnl1\x00', 0x0}) 23:35:02 executing program 1: pselect6(0x40, &(0x7f0000000940), 0x0, 0x0, &(0x7f0000000a00)={0x77359400}, &(0x7f0000000a80)={&(0x7f0000000a40)={[0x7]}, 0x8}) 23:35:02 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001010000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1076.585303] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1076.585303] 23:35:02 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, &(0x7f00000000c0)=@tipc, &(0x7f0000000080)=0xfffffffffffffffd) 23:35:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000009000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:02 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xb, 0x0, &(0x7f0000000300)) 23:35:02 executing program 4: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x6201) [ 1076.694830] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1076.694830] 23:35:02 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000280), 0x0, 0x2) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x1, @vbi}) 23:35:03 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) syz_mount_image$qnx4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x180, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)}], 0x10000, &(0x7f00000002c0)={[{'-,)%\'-,\'%\\'}, {','}, {'^\'/'}], [{@subj_type={'subj_type', 0x3d, '}:'}}, {@obj_role}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x0, 0x37, 0x0, 0x35], 0x2d, [0x30, 0x0, 0x33, 0x33], 0x2d, [0x36, 0x60, 0x0, 0x61], 0x2d, [0x62, 0x0, 0x64], 0x2d, [0x4e, 0x65, 0x39, 0x37, 0x0, 0x32, 0x65]}}}]}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000600)=0x10000) 23:35:03 executing program 0: syz_emit_ethernet(0x76, &(0x7f0000000200)={@local, @local, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x68, 0x0, 0x0, 0x0, 0x6, 0x0, @remote, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x15, 0x0, 0x0, 0x0, 0x0, {[@window={0x3, 0x3}, @mptcp=@remove_addr={0x1e, 0x3}, @fastopen={0x22, 0xf, "de04d843515846663a9c16e9e0"}, @exp_fastopen={0xfe, 0x9, 0xf989, "61ee5bd5ce"}, @generic={0x0, 0xa, "fc85a161d9825013"}, @window={0x3, 0x3}, @sack={0x5, 0x12, [0x0, 0x0, 0x0, 0x0]}]}}}}}}}, 0x0) [ 1076.806385] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1076.806385] [ 1076.826755] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1076.826755] 23:35:03 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 23:35:03 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x0) ioctl$SNDRV_SEQ_IOCTL_RUNNING_MODE(r0, 0xc0105303, &(0x7f0000000040)) 23:35:03 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000140000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1077.025163] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1077.025163] [ 1077.087579] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1077.087579] 23:35:03 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000100)={0x0, 0x1, 0x1}) 23:35:03 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000b000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:03 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001023000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:03 executing program 4: syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x4801) 23:35:03 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000180)={'batadv_slave_0\x00'}) 23:35:03 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300001c0000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:03 executing program 0: syz_mount_image$qnx4(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vxfs(0x0, &(0x7f0000000800)='./file0/file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f0000000840)="d56c", 0x2, 0xffff}, {&(0x7f00000009c0)='b', 0x1, 0xfffffffffffffffb}], 0x0, 0x0) 23:35:03 executing program 1: syz_mount_image$qnx4(&(0x7f0000000180), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)) 23:35:03 executing program 4: clock_gettime(0x7, &(0x7f0000000540)) [ 1077.636439] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1077.636439] [ 1077.645401] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1077.645401] 23:35:03 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000001a80)={0x698, 0x0, 0x0, "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"}) 23:35:03 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup/syz0\x00', 0x200002, 0x0) 23:35:03 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000030c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:03 executing program 0: select(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x7829}, 0x0, &(0x7f0000000100)={0x77359400}) [ 1077.774991] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1077.774991] [ 1077.795970] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1077.795970] 23:35:04 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000f000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:04 executing program 1: add_key$fscrypt_provisioning(&(0x7f0000000040), 0x0, 0x0, 0x0, 0xffffffffffffffff) 23:35:04 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={&(0x7f0000000480), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r1, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000900), 0xffffffffffffffff) 23:35:04 executing program 0: syz_open_dev$dri(&(0x7f00000000c0), 0xffffffffffffffff, 0x0) [ 1077.924523] nbd: must specify an index to disconnect 23:35:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000400000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:04 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x2c, 0x0, 0x0, "34e1be0c2d0caa3b5b6fd4136dad3ddb681457cc7876d41342204d1d80a75a8e96de87606bd6982faaba2dfd"}) 23:35:04 executing program 0: add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200), &(0x7f0000000240)={0x0, "09aa146e579843fe1577c167c822f208ac5956da6eb7fa3ff7cb2db3ef397d44d5de33fff740cbf3df6f81e3725ea45e5e16ad2c0000f067406281741df6439b"}, 0x48, 0xfffffffffffffffe) [ 1077.973990] nbd: must specify an index to disconnect 23:35:04 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000050c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:04 executing program 4: write$sndseq(0xffffffffffffffff, 0x0, 0x0) [ 1078.030796] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1078.030796] [ 1078.049386] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1078.049386] 23:35:04 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) 23:35:04 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, 0x0, 0x0) 23:35:04 executing program 1: sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, 0x0, 0xd62ff17ce2dbf5a1) [ 1078.213221] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1078.213221] [ 1078.257509] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1078.257509] 23:35:04 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000010000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:04 executing program 4: socket(0x18, 0x0, 0x100) 23:35:04 executing program 1: r0 = memfd_create(&(0x7f00000001c0)=')#.+$-.^:&\\+(\x00', 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 23:35:04 executing program 0: openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b40), 0x0, 0x0) 23:35:04 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000060c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000bf0000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:04 executing program 0: perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) 23:35:04 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_buf(r0, 0x0, 0x4, &(0x7f0000000000)="b46edea2af763099e1ad993d75e6ce1379a8eed9d40fe016e863aeeed932d21b14fa38fe6a26ab32cd", 0x29) 23:35:04 executing program 1: bind$can_raw(0xffffffffffffffff, 0x0, 0x0) [ 1078.448488] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1078.448488] 23:35:04 executing program 4: syz_mount_image$vxfs(0x0, &(0x7f0000000800)='./file0/file0\x00', 0x0, 0x4, &(0x7f0000000a40)=[{&(0x7f0000000840)="d56cd20f66223afc7589634cabdbf5d047c2f1d427fdfb31824cfa5a219dc4f5fe4c941c0666231ee466de066a5afb93449989bd194019cc61586f984ab777ad48b217ead9229cd477ce836b089592ca0d793f6f0976e2fc21fcc11c63a6c73e", 0x60, 0xffff}, {&(0x7f00000008c0)="79f52f81bc1da28ea8433c1330", 0xd, 0xa7dc}, {&(0x7f0000000900)="5424034c613a30e2ee4ef5e68bed22c9e751cebd6d1a43116fcaafb2b54ddd6d300219658e2e44a4b34a7a5c0bafab0ebd3ef75921d843cd8b42e5b258480f9804a91be18e61bf1532e3bcd5dc65da5b2e411c58bd81ca4be6a7d1ae4bc85d4c1971fa03f8eccac924bf50315f9df79b0e4129c9601502c8816ad91a1890fd2651740fc8e6d2db965c7f78edb612", 0x8e}, {&(0x7f00000009c0)="62e671ca7c5cc808802422e024e716f55741abddec84cfd0dd2400d58a3f1e428617a607c914f7dcfb85abc9a3cd4d6b713eefeb2ea3ab7e4cdd651026c43cd816293425e218862262d1c925b4717cb8c9b824bbf78b312359d1007f83931f333e", 0x61, 0xfffffffffffffffb}], 0x400, 0x0) 23:35:04 executing program 1: syz_mount_image$qnx4(0x0, &(0x7f00000001c0)='./file0\x00', 0x180, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)='\v', 0x1, 0x7}], 0x0, &(0x7f00000002c0)) 23:35:04 executing program 0: waitid(0x1, 0x0, 0x0, 0x40000008, 0x0) [ 1078.588448] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1078.588448] [ 1078.602981] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1078.602981] [ 1078.741369] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1078.741369] 23:35:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000011000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:05 executing program 0: syz_open_dev$sg(&(0x7f0000000040), 0x0, 0xc80c2) 23:35:05 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000001a80)={0x4e0, 0x0, 0x0, "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"}) 23:35:05 executing program 1: syz_open_dev$loop(&(0x7f0000001c40), 0x5, 0x0) 23:35:05 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000070c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030003bf0000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:05 executing program 0: bind$802154_dgram(0xffffffffffffffff, 0x0, 0x0) 23:35:05 executing program 4: syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) 23:35:05 executing program 0: bpf$BPF_PROG_GET_NEXT_ID(0xb, &(0x7f0000000000), 0xffffffffffffff01) 23:35:05 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000090c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:05 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, &(0x7f0000000000)) [ 1078.956065] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1078.956065] 23:35:05 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000880), 0x42000, 0x0) [ 1079.074685] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1079.074685] [ 1079.084824] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1079.084824] 23:35:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000012000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:05 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x9, 0x2) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000000)={0x3}) 23:35:05 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_INIT_QP_ATTR(r0, &(0x7f0000000100)={0xb, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, 0x8}}, 0x18) 23:35:05 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000b0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000030000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:05 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)={{}, {0x0, 0x3}}) 23:35:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000000040), 0x4) [ 1079.232697] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1079.232697] [ 1079.242533] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1079.242533] 23:35:05 executing program 1: r0 = syz_open_dev$vbi(&(0x7f0000000080), 0x0, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000100)={0x0, 0x3, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "4e9fb97f"}, 0x0, 0x0, @planes=0x0}) 23:35:05 executing program 4: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x2) r0 = perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x3, 0x6, 0xc0, 0x4, 0x0, 0x91, 0x2408, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x1, 0x5b2b}, 0x4000, 0x4, 0x1ff, 0x4, 0x7, 0x7, 0x8, 0x0, 0x4, 0x0, 0xffffffffffffff33}, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x3) r1 = syz_mount_image$qnx4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x180, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="0bf177ba478384d3396c9028347779e3e233a54b25637d43e6bec9fe742d6ecf60fe9f711719d1c55b46e20cf79f70ebe9be9237f7b8361abfdae6125c53068ce6aa45e10cf99c695d77f0bc66738d257820a9adab43", 0x56, 0x7}], 0x10000, &(0x7f00000002c0)={[{'@]\\+-@\'(\x00'}, {':#'}, {}, {'-,)%\'-,\'%\\'}, {','}, {'^\'/'}, {}, {')'}], [{@subj_type={'subj_type', 0x3d, '}:'}}, {@obj_role}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x8, 0x65, 0x37, 0x31, 0x35, 0x30, 0x65], 0x2d, [0x30, 0x31, 0x33, 0x33], 0x2d, [0x36, 0x60, 0x62, 0x61], 0x2d, [0x62, 0x35, 0x64, 0x34], 0x2d, [0x4e, 0x65, 0x39, 0x37, 0x34, 0x32, 0x65, 0x65]}}}, {@obj_user}, {@pcr={'pcr', 0x3d, 0x22}}, {@obj_user}]}) fchmodat(r1, &(0x7f0000000380)='./file0\x00', 0x0) unlinkat(r1, &(0x7f00000003c0)='./file0\x00', 0x0) r2 = perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x8, 0x2, 0x6, 0xff, 0x0, 0x80000001, 0x4cea1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x8, 0x7}, 0xa04, 0x10000, 0x9, 0x5, 0x81c1, 0x4637, 0x0, 0x0, 0x9, 0x0, 0x3f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r2, 0x40082404, &(0x7f0000000480)=0x81) ioctl$PERF_EVENT_IOC_SET_BPF(r2, 0x40042408, 0xffffffffffffffff) r3 = perf_event_open$cgroup(&(0x7f0000000540)={0x1, 0x80, 0x6, 0x8, 0x0, 0x5, 0x0, 0x1, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x1, @perf_bp={&(0x7f0000000500), 0x4}, 0x10, 0x81, 0x7fffffff, 0x7, 0x3f, 0x80000000, 0x40, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000005c0)='^\'/') ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000600)=0x10000) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000001b80), 0x200, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000001c40)={0x0, @in={{0x2, 0x4e23, @loopback}}}, 0x84) 23:35:05 executing program 0: syz_open_dev$dri(&(0x7f00000001c0), 0x1, 0xcd41) [ 1079.352112] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1079.352112] 23:35:05 executing program 0: openat$dlm_control(0xffffffffffffff9c, 0x0, 0x0, 0x0) 23:35:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000040000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:05 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000040)={0x0, 0x0, 0x0, "ca58d58b6678ae4d7f1a1dcd1cd561ab5726d1036828318d8a3a8903a1936c7b"}) 23:35:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000013000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:05 executing program 4: bpf$LINK_GET_FD_BY_ID(0x1e, 0x0, 0x47) 23:35:05 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:05 executing program 4: openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f00000001c0), 0x2, 0x0) [ 1079.645218] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1079.645218] [ 1079.663637] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1079.663637] 23:35:05 executing program 1: socket(0xa, 0x0, 0x80000) 23:35:05 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000d0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000023000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000080000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:05 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private}, @mcast2}}) 23:35:05 executing program 0: openat$sndseq(0xffffffffffffff9c, 0x0, 0x40000) syz_genetlink_get_family_id$wireguard(&(0x7f00000003c0), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000c40), 0xffffffffffffffff) 23:35:06 executing program 4: syz_mount_image$vxfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000a40)=[{&(0x7f00000009c0)='b', 0x1, 0xfffffffffffffffb}], 0x0, 0x0) 23:35:06 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000001c00)={'wlan0\x00'}) [ 1079.961152] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1079.961152] [ 1079.961908] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1079.961908] 23:35:06 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000f0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:06 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000280), 0x9, 0x2) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x1, @vbi}) 23:35:06 executing program 0: readlinkat(0xffffffffffffffff, 0x0, &(0x7f0000000480)=""/18, 0x12) 23:35:06 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={0x0}}, 0x0) [ 1080.149535] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1080.149535] [ 1080.161412] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1080.161412] 23:35:06 executing program 0: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, 0x0) 23:35:06 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r0, 0x2) 23:35:06 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000048000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:06 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000100000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:06 executing program 1: pselect6(0x0, 0x0, &(0x7f0000000980), &(0x7f00000009c0), &(0x7f0000000a00)={0x77359400}, &(0x7f0000000a80)={&(0x7f0000000a40)={[0x7]}, 0x8}) 23:35:06 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000200c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:06 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x0, 0x7800}}) [ 1080.403075] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1080.403075] 23:35:06 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x3, &(0x7f00000000c0)=[{0x25, 0x0, 0x1, 0xfffffffc}, {}, {0x6}]}) fcntl$F_GET_RW_HINT(0xffffffffffffffff, 0x40b, 0x0) 23:35:06 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000230c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1080.514809] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1080.514809] [ 1080.527673] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1080.527673] 23:35:06 executing program 0: socket(0x0, 0xa4fde4cc95ec52d8, 0x0) [ 1080.553434] audit: type=1326 audit(1621121706.744:119): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=392 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 23:35:06 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010003f0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:06 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000140000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1080.683262] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1080.683262] 23:35:06 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600004c000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:07 executing program 0: socketpair(0x1d, 0x0, 0x81, 0x0) [ 1080.801641] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1080.801641] 23:35:07 executing program 0: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1080.865236] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1080.865236] 23:35:07 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000400c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1080.955828] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1080.955828] 23:35:07 executing program 1: openat$vsock(0xffffffffffffff9c, 0x0, 0x610900, 0x0) 23:35:07 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) 23:35:07 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000060000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1081.360966] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1081.360966] [ 1081.384821] audit: type=1326 audit(1621121707.574:120): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=392 comm="syz-executor.4" exe="/root/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x4665d9 code=0x0 23:35:07 executing program 4: waitid(0x0, 0x0, 0x0, 0x0, &(0x7f0000000000)) 23:35:07 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300001c0000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:07 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100fff0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1081.450503] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1081.450503] 23:35:07 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, 0x0, 0x111}}, 0x20) 23:35:07 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x40) 23:35:07 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000068000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1081.615074] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1081.615074] 23:35:07 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x9, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000100)={0x0, 0x1, 0x1}) 23:35:07 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x9, 0x2) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000240)={0x0, 0x3, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "d3396291"}, 0x0, 0x0, @planes=0x0}) 23:35:07 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000020c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:07 executing program 1: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f0000000040)={'batadv_slave_0\x00'}) 23:35:07 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000340)=ANY=[@ANYBLOB='P']) [ 1081.753525] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1081.753525] [ 1081.766926] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1081.766926] 23:35:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000001c0)}) 23:35:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000bf0000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:08 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000540), 0x101000, 0x0) 23:35:08 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000030c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1081.886460] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1081.886460] 23:35:08 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000240)={0x0, 0x0, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "d3396291"}, 0x0, 0x0, @planes=0x0}) 23:35:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600006c000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000001c0)}) [ 1082.038444] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1082.038444] 23:35:08 executing program 0: keyctl$search(0xa, 0x0, &(0x7f0000000040)='id_resolver\x00', 0x0, 0xfffffffffffffff8) 23:35:08 executing program 4: mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x1000007, 0x10, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f000000e000)={0xe, 0x4, &(0x7f0000000040)=@framed={{0xffffffb4, 0x5, 0x0, 0x0, 0x0, 0x61, 0x10, 0x60}, [@ldst={0x4}]}, &(0x7f0000003ff6)='GPL\x00', 0x4, 0xfd90, &(0x7f000000cf3d)=""/195, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000000), 0x366, 0x10, &(0x7f0000000000), 0x1dd}, 0x48) [ 1082.108755] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1082.108755] 23:35:08 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000040c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:08 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000001c00)={0x1a, 0x0, 0x0, 0x0, 0x8, 0x2}, 0x10) [ 1082.224010] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1082.224010] 23:35:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000001c0)}) 23:35:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000074000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000bf0300090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:08 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000001a40), 0x4dd083, 0x0) 23:35:08 executing program 4: r0 = fork() capset(&(0x7f0000000040)={0x20071026, r0}, 0x0) 23:35:08 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) r1 = openat$ion(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$ION_IOC_HEAP_QUERY(r1, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f00000001c0)}) [ 1082.494726] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1082.494726] 23:35:08 executing program 0: syz_genetlink_get_family_id$l2tp(&(0x7f0000000100), 0xffffffffffffffff) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, 0x0) getsockname(r0, 0x0, 0x0) 23:35:08 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000050c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:08 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}) [ 1082.609640] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1082.609640] [ 1082.621753] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1082.621753] 23:35:08 executing program 4: socketpair(0x0, 0x0, 0x7b04, 0x0) getsockname(0xffffffffffffffff, 0x0, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) openat$vim2m(0xffffffffffffff9c, &(0x7f0000000200), 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) openat$vmci(0xffffffffffffff9c, &(0x7f00000009c0), 0x2, 0x0) 23:35:08 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) ioctl$SCSI_IOCTL_GET_IDLUN(r0, 0x5382, 0x0) [ 1082.655053] Unknown ioctl -1060088316 [ 1082.667846] Unknown ioctl -1060088316 23:35:08 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 23:35:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600007a000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:08 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_KEEP_ORPHAN(r0, 0x2288, 0x0) [ 1082.827341] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1082.827341] 23:35:09 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000002800090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:09 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_PACK_ID(r0, 0x227c, 0x0) 23:35:09 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000060c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:09 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f0000000000)={0x0, 0x0, 0x0, 'queue0\x00'}) 23:35:09 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "a237b83c66eeb47fbb2ce12bac23ed1fbc13926e77326618c0d10202fee0c68c4ccdd1d775e11fa884e09efd2675c5c0097251bef6591a0eefa7caad9f03d9e2"}, 0x48, 0xfffffffffffffffa) [ 1082.905189] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1082.905189] 23:35:09 executing program 0: syz_read_part_table(0x0, 0x3, &(0x7f0000000380)=[{}, {&(0x7f00000000c0)="e478047c917caf82d37f7f01a4bd8d234849f041a943c999125dc8ae6d330813d3b11f7c428a9e8bcb7491f565a374e567e92a2486385422a0d05ec92619966c647926348169c8f514d2188b88bef2bb9e4b6cfbb6ae3f746338cf2b332b5f39b9db2fe8ca8c977562b6970759ec9e4ecc1d6f62f94907f5e4020ee4274888215277e54c4e81d1039f32e1bbc3b6385235726e6610c704ee6cf5c14df737933c3187617808b12f02b241e836de45378f10b20dc133a6978098c3549313", 0xbd, 0xfffffffffffffff8}, {0x0, 0x0, 0xefc}]) 23:35:09 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000480)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000080)={'bridge_slave_1\x00', 0x0}) r2 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000280)=ANY=[@ANYBLOB="7c0000001000010400"/20, @ANYRES32=r1, @ANYBLOB="000000000000000054001280110001006272696467655f736c617665000000003c0005800600020009000000050009"], 0x7c}}, 0x0) 23:35:09 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$ARPT_SO_SET_REPLACE(r0, 0x0, 0x60, &(0x7f0000000580)={'filter\x00', 0x7, 0x4, 0x3b8, 0xe8, 0xe8, 0xe8, 0x2d0, 0x2d0, 0x2d0, 0x4, 0x0, {[{{@arp={@remote, @multicast2, 0xff, 0x0, 0x7, 0x7, {@mac=@broadcast, {[0x7f, 0xff, 0x0, 0xff]}}, {@mac=@remote}, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 'ip6gretap0\x00', 'syz_tun\x00', {}, {}, 0x0, 0x4}, 0xc0, 0xe8}, @unspec=@NFQUEUE1={0x28, 'NFQUEUE\x00', 0x1, {0x0, 0x7fff}}}, {{@arp={@empty, @empty, 0xffffff00, 0x0, 0x9, 0xc, {@mac=@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x1}, {[0xff, 0xff, 0x0, 0x0, 0x0, 0xff]}}, {@mac=@random="ab2a021bdfad", {[0x0, 0x0, 0xff, 0x0, 0xff]}}, 0xfffd, 0x8, 0x8, 0x9, 0x9, 0x1, 'wg0\x00', 'veth0_to_hsr\x00', {0xff}}, 0xc0, 0xe8}, @unspec=@STANDARD={0x28, '\x00', 0x0, 0xffffffffffffffff}}, {{@arp={@private, @local, 0x0, 0x0, 0x0, 0x0, {@mac=@dev, {[0xff]}}, {@empty, {[0x0, 0xff]}}, 0x7, 0xf5, 0x1, 0x0, 0x0, 0x0, 'erspan0\x00', 'rose0\x00', {0xff}, {0xff}, 0x0, 0x80}, 0xc0, 0x100}, @unspec=@RATEEST={0x40, 'RATEEST\x00', 0x0, {'syz0\x00', 0x0, 0x6, {0xd259788}}}}], {{'\x00', 0xc0, 0xe8}, {0x28}}}}, 0x408) 23:35:09 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000240)={'ip6gre0\x00', &(0x7f00000001c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xa5aef7f3229ddd55}}) [ 1083.017653] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1083.017653] [ 1083.054578] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1083.073566] x_tables: duplicate underflow at hook 1 23:35:09 executing program 0: syz_mount_image$qnx4(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000280)=[{0x0}, {&(0x7f0000000140)="06", 0x1, 0xffffffff}, {0x0}], 0x0, &(0x7f0000000300)={[{'!'}], [{@defcontext={'defcontext', 0x3d, 'system_u'}}, {@appraise_type}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '}$%'}}]}) syz_mount_image$reiserfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000440)="9a", 0x1}], 0x41000, &(0x7f0000000580)={[{@usrjquota_file}]}) syz_mount_image$reiserfs(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x0, &(0x7f0000000880), 0x440081, &(0x7f00000008c0)={[{@jqfmt_vfsv0}, {@tails_small}]}) [ 1083.095964] netlink: 40 bytes leftover after parsing attributes in process `syz-executor.1'. [ 1083.136400] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1083.136400] 23:35:09 executing program 1: syz_mount_image$qnx4(0x0, 0x0, 0x0, 0x3, &(0x7f0000001a00)=[{&(0x7f0000000700)='{', 0x1}, {&(0x7f0000000800)="c13190a72c781114217c3813f52a6fc1d06b5704b4b6b064eaf1fff3d9c070d78c9521ecd27431ca283784b5ed8b79a430c9b10883f62c05bd4c519381ca27e2e22c1b70243381c238424f4b78c2f4749f1f317e6023e54de119233902559395161247dfa488361d682639a5db7edc4a4dac9857d898d4e04dbad1edf65300dfe7d21d6cd3ff10656887f82590c3d2eaf3da71aaf54a365958256013d81064e02b1c936fd818d3e808fa46328a15fb3796d44c591365fa7adcf108573547d63e628df3925f765bf0805a142af3e6f06dc2a7b75bf35857e2aa131bd0c894f2c09adc9385a7fb2cda4ad67dacfa2f88a25bb5c72b1a11b631e8117a226c94ac3c5fbef1453720565ee4b1ee499d2b01848b120c21a7cabc88b694d62376b97a48d6a8d40105c3d224e510737da0d12f042396c5e333625573479f6feb10f211bcb322659f75895310f483e06142dc8c3f5fd00ee91f1724084f5d021364902d25e57b0b7ce8fbce2f8fa61d6398ea55784f62f78a61f4635c1a40a085e22bc0b8d84a2e97bebff2da95ab9d02250ef8859678989938c52df85595aa190882851c7eb5a18a6e23ed1e433dee7dd843e359daae39af7a6881cdc416f3cdde8ddd61b8117b5e87dfba387dfb739f7b91edd811b508e51e241c4f5b36cfc450e102a409353d3fb7bcdedadb39f7f3d29a83d24ade157e9aa6e4888f4cbde7eddd7e529afbba2756c721dd0afb266bfd5861e8833ad42dd5dc0397dca0cbc0c0a4f5bf855b6876b37dfdf2babf4663e7b04d449c13cc9ce7032d95ef96c9e28bc406d86cabfebfca3a5bfe02fa1d7e57ce5822b026f7f8362db09344fdeb31cf940e4d71ef783a62302c45858870f83ed352fd913d80bf329860b8218f9af62309c2e10e704ecafe92bf8b949ef58e105ccff1828953b18deac4b026e73f1ecd4cf0dab2b2e8bcccb988653ba4e023dcfcf6253caf3302ae5470ce386776f1d36bd9fa6c228ede38b186eaf4febcce4bbad72a0d506953f65cc007f34fe96af27b70d5aa2f22dce52f8a85d6545b608823cbf57e7be03289ed1536003b4dcf03377baeefde4eee966d8eec83d57e48fde8151527e754cd8c5042fecf13535cb3d496c47677cc33a430cc83f2f0cabfa7b011b7663db75bcf0a60a806d68f0ef7d971e8212f98749713de776b6c42c4111367618d33d619d1816b430f7d1c8913040bb8e1a16c2e188d8c94443247885dd11999607d101f051fb9e3da5cabe7b1b91c28a5663e858304bc45c9950c3ac8520de577d354822c5406062a038a058122188313e728c83ae1fbb934074882fa598c4faac09c08d4f0c2d7c23db844b40922dca0482b1cfd7c83007555ca0fdc28e4285c63acf0d29b0da12a95849efa0c72af753be82712e93655b391510f78eb01074e42c85aa21227df1b806d63e20d404aaa20064f55770c5874eeb92613e791565d288dc957183b530276a35cd5da49cd26a245dbac4689bffa43b2ceeda1aca8797f5ceb58c18028bac1b51aa0a9541beda37c6e17ade53ce2fec962a97aabbbc736ae321a7c9c6dc4295430a18f66025c475a2ce0f25f763f36e81ae274ec8ff2b5cf410a1b2568340ff3072c52909ef5c8f4c39c031274a220bf9298fffdb83b72022688b099acdb927797ffce2a7a9176931fbc875209014882e1d4d945c8a90adf5ff6ea743fb72038181709a7fd3e22fafe380036485f3336f6180607b31a20085eb45d35a58f0f4bee199f09f399aa2dab839226a140202394fac9fdf439c8ec7511d7995c3cf3af1e5b69c5b3b936ff94142a786384fba44960d8337cfade22b4a3c64544c0ebe08c92ece1fd78ec07c57add023051be45ef16ac04571d8ff63c376c4e7c0fe3ada54a5e7657d79b5b411ae246567c16223d3d6c9ed396ced6065c2de4e5782fcdcd9a25289a9a152444a0a9681f4342715118b7a48de9b015e77d22f02f8993929bef79396206bfe97372d69f1758ffce9ab73e0af6dcac23c3cefcab194a322fb66b09e81ee8d4e79a3a662805191e5788ab662fb8ad678f64a028cb62861ed296e6e092266a1538f8ed827fb971fea996e930a2077a4f41ff1ef2e410a40b1be7b0352ead1958a58b6371a3ff3a9c4a1340268481c6ee2d5aff899951a5ca25a4b7124d10dc629127570c90ce638575aa78e7b96f73563fd384d6023aa03c40585382b5d3c525fa203127c7bb9a8afabcb476153d6125dcda60877e2cc5d55d3ffb895c799205b608256dc2020d60f225904b65c49a9ff6fd5442c262d7ea79044b7eb649f39c1d2c7d688659d43155e1b42b7c86c328df7c5cdcfc6b96e79f462b6284ca302f8cc12e06e2ea723b62803c9c21b2e163ab4235f2ff59d90e1a6f430c5af89a591a3b71b3388d171494d93117c5af5597060116d6d4ec2e6d4ef81811688bff08947057009f0b986e38b50bd26f85dc3a56421312ebb3c96405d5e979cf97cf6f13de0230668631649db4e7aeed6a201c7f2e3cfd1d7e92b13449e26ba015f85a0eeae251929a9a28acfa7efcdbf61bbcc18811cc4c47ee9c9d8cb31fe5f7926e5478d4ba1f626ed633595e5a35cff3cd84af7d67cc57cae678145bbe69afe88ed05f6c8729bf4ce86a5709f97d95427f7bc8e0bfcafef5bd7f4e8f55fe1ffb99330a28cca5465d7c33dadc7efab0281651c0f3c3ad4644b4bee7cd9628f472cbee59595f0c4d2adbd6b6f330b9a259276cc42e7d83f1ce1fe1acdeb3f3f84e3da5c5257c487b6ffb4b58dbe2dff1c6706076685698b0bce5e12eff5ab260c57adba7aa7ff6172fa0be67afbd9f523c14f01193472f289e2b0a282e44357544c6aec819b32a44b297ffbd14f370ab44f332e2dbad49b0b9601b09becfccd63e", 0x801}, {&(0x7f0000001800)="ff", 0x1}], 0x0, 0x0) 23:35:09 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$SG_SET_FORCE_PACK_ID(r0, 0x227b, 0x0) 23:35:09 executing program 0: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$vhost_msg_v2(r0, 0x0, 0x0) [ 1083.227769] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1083.227769] [ 1083.273085] Unknown ioctl 8827 23:35:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000f0000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:09 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020200090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:09 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000070c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:09 executing program 4: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, 0x0, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), 0xffffffffffffffff) socketpair(0x0, 0x0, 0x0, &(0x7f0000000540)) syz_genetlink_get_family_id$nl80211(&(0x7f0000000900), 0xffffffffffffffff) 23:35:09 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)={0x1f, 0x3}) 23:35:09 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_FILTER(r0, 0x65, 0x1, &(0x7f00000003c0)=[{}], 0x8) [ 1083.430366] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1083.430366] 23:35:09 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f0000001100)={0xffffffffffffffff, 0x0, 0x0}, 0x20) 23:35:09 executing program 1: ioctl$vim2m_VIDIOC_PREPARE_BUF(0xffffffffffffffff, 0xc058565d, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, 0x0, 0x0) ioctl$vim2m_VIDIOC_ENUM_FMT(0xffffffffffffffff, 0xc0405602, 0x0) ioctl$vim2m_VIDIOC_DQBUF(0xffffffffffffffff, 0xc0585611, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETPRL(0xffffffffffffffff, 0x89f4, &(0x7f0000000340)={'syztnl2\x00', &(0x7f00000002c0)={'ip6_vti0\x00', 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, @private0, @private2, 0x7800, 0x10, 0x0, 0x2}}) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) clock_gettime(0x0, &(0x7f0000000400)) 23:35:09 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000001200)={&(0x7f00000000c0)='./file0\x00'}, 0x10) [ 1083.482391] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1083.482391] 23:35:09 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000080c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:09 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r0, 0xc05c5340, &(0x7f00000001c0)) 23:35:09 executing program 4: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={0x0}}, 0x851) [ 1083.622666] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1083.622666] [ 1083.641275] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1083.641275] 23:35:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000030000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:09 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020300090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:09 executing program 1: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000240)={'ip6gre0\x00', 0x0}) 23:35:09 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000090c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:09 executing program 0: syz_read_part_table(0x0, 0x2, &(0x7f0000000380)=[{0x0, 0x0, 0xfffffffffffffff8}, {0x0}]) 23:35:09 executing program 4: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x109000) 23:35:10 executing program 1: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @mss={0x2, 0x81}, @window={0x3, 0x4, 0x1ff}], 0x3) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, 0x0) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r1, 0x400, 0x70bd26, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x22}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, 0x0, 0x0) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x34, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x34}, 0x1, 0x0, 0x0, 0x4040014}, 0x4004000) socketpair(0x1d, 0x0, 0x0, &(0x7f0000000500)) 23:35:10 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000001540)={'sit0\x00', &(0x7f00000014c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @dev={0xfe, 0x80, '\x00', 0x3a}, @empty}}) [ 1083.884924] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1083.884924] 23:35:10 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000b0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:10 executing program 4: prctl$PR_GET_SECCOMP(0x15) clock_gettime(0x0, 0x0) clock_gettime(0x1, &(0x7f0000000080)) [ 1083.940424] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1083.940424] 23:35:10 executing program 4: keyctl$update(0x2, 0x0, &(0x7f00000003c0)='?', 0x1) 23:35:10 executing program 0: socketpair(0x29, 0x0, 0x0, 0x0) [ 1084.007891] can: request_module (can-proto-0) failed. [ 1084.025433] can: request_module (can-proto-0) failed. [ 1084.051654] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1084.051654] [ 1084.084327] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1084.084327] 23:35:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000050000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:10 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020400090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:10 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, 0x0) 23:35:10 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$VHOST_NET_SET_BACKEND(r0, 0x4008af30, 0x0) 23:35:10 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) fcntl$setlease(r0, 0x400, 0x0) 23:35:10 executing program 4: openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x216000, 0x0) 23:35:10 executing program 1: openat$dlm_monitor(0xffffffffffffff9c, 0x0, 0x111000, 0x0) 23:35:10 executing program 0: ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000100)=@buf={0x29, &(0x7f0000000040)="c35ceb7ac6510603cde1fb82dcd8ef0d3e3c5722e03740abd0b58846a8304d795b046006b818247997"}) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='pids.current\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0xc0c0583b, &(0x7f0000000000)) 23:35:10 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000c0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:10 executing program 1: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x4000) 23:35:10 executing program 4: syz_mount_image$reiserfs(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x0, &(0x7f0000000880), 0x0, &(0x7f00000008c0)) 23:35:10 executing program 1: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, 0x0) [ 1084.384395] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1084.384395] [ 1084.413210] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1084.413210] [ 1084.514205] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1084.514205] [ 1084.514375] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1084.514375] 23:35:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000060000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:10 executing program 0: syz_read_part_table(0x0, 0x1, &(0x7f0000000380)=[{&(0x7f0000000000)="cc5e3c6796b4e5489379681ce097cab1adb13cb20259db75d0b1a3e41204ac8f447f046655867be2dc11142d54dbe30bfdd56c0c8d4169333a17c34c2d80e094401187974f019685cde504", 0x4b, 0x9}]) 23:35:10 executing program 4: add_key(&(0x7f00000000c0)='id_legacy\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f00000001c0)='c', 0x1, 0xfffffffffffffffb) 23:35:10 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x2101, 0x0) 23:35:10 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000d0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:10 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020500090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:10 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0xb, &(0x7f0000000040)=""/171, &(0x7f0000000300)=0xab) 23:35:10 executing program 0: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000040)) bpf$BPF_PROG_GET_NEXT_ID(0xb, 0x0, 0x0) 23:35:10 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000f0c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:10 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) dup3(r0, r1, 0x0) [ 1084.735119] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1084.735119] [ 1084.786592] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1084.786592] 23:35:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000070000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:11 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={&(0x7f0000000480), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r1, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000900), 0xffffffffffffffff) 23:35:11 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020600090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:11 executing program 0: syz_mount_image$qnx4(0x0, &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(0x0, &(0x7f0000000640)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 1084.905211] nbd: must specify an index to disconnect [ 1084.918045] nbd: must specify an index to disconnect 23:35:11 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) dup3(r0, r1, 0x0) 23:35:11 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SUBSCRIBE_PORT(r0, 0x40505330, &(0x7f0000000000)) 23:35:11 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000230c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:11 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x2) r0 = syz_mount_image$qnx4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x180, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x7}], 0x10000, &(0x7f00000002c0)={[{':#'}, {}, {'-,)%\'-,\'%\\'}, {'^\'/'}, {}, {')'}], [{@subj_type={'subj_type', 0x3d, '}:'}}, {@obj_role}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x8, 0x65, 0x37, 0x0, 0x0, 0x30], 0x2d, [0x0, 0x31, 0x33], 0x2d, [0x0, 0x60, 0x62, 0x61], 0x2d, [0x62, 0x35, 0x64, 0x34], 0x2d, [0x4e, 0x0, 0x39, 0x37, 0x34, 0x0, 0x65, 0x65]}}}, {@obj_user}, {@pcr={'pcr', 0x3d, 0x22}}]}) fchmodat(r0, 0x0, 0x0) perf_event_open$cgroup(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r1, 0x84, 0x6, &(0x7f0000001c40)={0x0, @in={{0x2, 0x4e23, @loopback}}}, 0x84) [ 1085.054912] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1085.054912] 23:35:11 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) dup3(r0, r1, 0x0) [ 1085.125167] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1085.125167] 23:35:11 executing program 1: clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nfc_raw(0x27, 0x3, 0x0) dup3(r0, r1, 0x0) 23:35:11 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020700090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:11 executing program 0: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000001c00), 0x10) [ 1085.211003] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1085.211003] 23:35:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000090000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:11 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000d", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:11 executing program 4: syz_read_part_table(0x8001, 0x4, &(0x7f0000000380)=[{&(0x7f00000000c0)="e478047c917caf82d37f7f01a4bd8d234849f041a943c999125dc8ae", 0x1c, 0xfffffffffffffff8}, {0x0, 0x0, 0xefc}, {&(0x7f0000000280)="25e2fdbb93829cf1aaf344ab5df0f5d14276de9b31a7a17b30d70bb6a30a49056668b61d4ea7817a773142065d08cc58b6b04a17e1eac2054634971688223dce1ae037722954d149120c1aeaa809bb8e0bbbdc9a31b7a57e9f889fc314fe30d2ad8e66394557", 0x66, 0x1}, {&(0x7f0000000300)="dfd1b1e8358a07761857cf32b0f69d61414a7f3141115a2768359c0d3611edd94bf59b77f6a229dbc48607c566678b685251827860ca5df2aa74fcbd9c17109ca40292e49aebb5942e4561", 0x4b, 0xfffffffffffffe01}]) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000480), 0xffffffffffffffff) 23:35:11 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, 0x0) 23:35:11 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCDELPRL(r0, 0x89f6, &(0x7f0000000840)={'sit0\x00', 0x0}) 23:35:11 executing program 4: syz_mount_image$reiserfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000580)={[{@notail}, {@usrjquota_file}]}) [ 1085.418530] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1085.418530] 23:35:11 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x4058534c, &(0x7f0000000000)) 23:35:11 executing program 4: capset(&(0x7f00000000c0)={0x19980330}, &(0x7f0000000040)) capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000000100)) 23:35:11 executing program 4: r0 = syz_mount_image$qnx4(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x49000, &(0x7f0000000280)={[{'['}, {']@'}, {'/dev/dlm-control\x00'}, {'/dev/dlm-control\x00'}]}) readlinkat(0xffffffffffffffff, 0x0, &(0x7f0000000500)=""/188, 0xbc) fanotify_mark(0xffffffffffffffff, 0x42, 0x0, r0, 0x0) syz_mount_image$vxfs(&(0x7f00000007c0), &(0x7f0000000800)='./file0/file0\x00', 0x7fff, 0x2, &(0x7f0000000a40)=[{0x0}, {&(0x7f00000009c0)}], 0x400, &(0x7f0000000ac0)={[{'^\xb2!:'}], [{@appraise}]}) [ 1085.549629] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1085.549629] [ 1085.564253] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1085.564253] 23:35:11 executing program 4: clock_gettime(0x0, &(0x7f0000000380)) 23:35:11 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020800090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1085.701204] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1085.701204] [ 1085.759146] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1085.759146] 23:35:12 executing program 0: r0 = fork() process_vm_writev(r0, &(0x7f0000002ac0)=[{&(0x7f0000002680)=""/230, 0xe6}, {&(0x7f0000000100)=""/111, 0x6f}], 0x2, &(0x7f0000002a00)=[{&(0x7f0000002c80)=""/4096, 0x1000}], 0x1, 0x0) 23:35:12 executing program 1: pselect6(0x40, &(0x7f0000000940), 0x0, &(0x7f00000009c0)={0x10000}, &(0x7f0000000a00)={0x77359400}, 0x0) 23:35:12 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000014", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:12 executing program 4: futimesat(0xffffffffffffffff, 0x0, &(0x7f00000003c0)={{}, {0x77359400}}) 23:35:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000b0000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:12 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020900090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:12 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) 23:35:12 executing program 4: socket(0x0, 0x9eb032bf4473fb59, 0x0) 23:35:12 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, 0x0) [ 1086.244024] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1086.244024] [ 1086.278530] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1086.278530] 23:35:12 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000040)={&(0x7f00000000c0)='./file0\x00'}, 0x10) 23:35:12 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000017", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:12 executing program 0: add_key$fscrypt_v1(&(0x7f0000002440), &(0x7f0000002480)={'fscrypt:', @desc4}, &(0x7f00000024c0)={0x0, "acda511a1261a7916271f8a0bd9f9761430a8b7bb7712b8257799fae4389fef1d4a31f349c65a83b8bd1db17850aa36fb72184464927b1c0445dc81a9a1b2243"}, 0x48, 0xfffffffffffffff8) 23:35:12 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000540), 0x0, 0x0) 23:35:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000f0000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1086.391862] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1086.391862] 23:35:12 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x34, 0x0, 0x0, "34e1be0c2d0caa3b5b6fd4136dad3ddb681457cc7876d41342204d1d80a75a8e96de87606bd6982faaba2dfd15a9d92c756c9155"}) 23:35:12 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000380)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000044d80)={0xfff, [], 0x0, "bf5d37cc160e95"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) 23:35:12 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000080)={{0x0, 0x2}}) 23:35:12 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020b00090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:12 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000003f", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1086.611248] hub 9-0:1.0: USB hub found 23:35:12 executing program 1: socket(0x2, 0x2, 0x2) [ 1086.635139] hub 9-0:1.0: 8 ports detected 23:35:12 executing program 0: r0 = syz_open_dev$cec(&(0x7f0000000000), 0x3, 0x2) ioctl$VIDIOC_QBUF(r0, 0xc058560f, 0x0) [ 1086.671549] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1086.671549] [ 1086.729771] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1086.729771] 23:35:13 executing program 1: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() syz_open_procfs$namespace(r0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000600)='cpuacct.usage_user\x00', 0x26e1, 0x0) bpf$ITER_CREATE(0x21, 0x0, 0x0) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.controllers\x00', 0x7a05, 0x1700) bpf$PROG_LOAD(0x5, &(0x7f0000000600)={0x0, 0x7, &(0x7f0000000680)=ANY=[], &(0x7f00000004c0)='GPL\x00', 0x1f, 0x25, &(0x7f0000000040)=""/37, 0x41100, 0x1, '\x00', 0x0, 0x2f, r2, 0x8, &(0x7f0000000540)={0x1, 0x2}, 0x8, 0x10, &(0x7f0000000580)={0x2, 0x6, 0x100, 0x5}, 0x10}, 0x78) openat$cgroup_ro(r2, 0x0, 0x0, 0x0) bpf$BPF_PROG_QUERY(0x10, &(0x7f0000000080)={0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0}, 0x20) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0xc0c0583b, &(0x7f0000000000)=0x200000000000000) 23:35:13 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000bf", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:13 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x7f, 0x3d, 0x6, 0x0, 0x4, 0x1224, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf7, 0x5, @perf_bp={&(0x7f0000000000), 0xc}, 0x10000, 0x2, 0x3, 0x3, 0xffffffff80000001, 0x1e, 0x2, 0x0, 0x7fffffff, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x2) r1 = perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x3, 0x6, 0xc0, 0x4, 0x0, 0x91, 0x2408, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x1, 0x5b2b}, 0x4000, 0x4, 0x1ff, 0x4, 0x7, 0x7, 0x8, 0x0, 0x4, 0x0, 0xffffffffffffff33}, 0xffffffffffffffff, 0x3, r0, 0x3) r2 = syz_mount_image$qnx4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x180, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="0bf177ba478384d3396c9028347779e3e233a54b25637d43e6bec9fe742d6ecf60fe9f711719d1c55b46e20cf79f70ebe9be9237f7b8361abfdae6125c53068ce6aa45e10cf99c695d77f0bc66738d257820a9adab43", 0x56, 0x7}], 0x10000, &(0x7f00000002c0)={[{'@]\\+-@\'(\x00'}, {':#'}, {}, {'-,)%\'-,\'%\\'}, {','}, {'^\'/'}, {}, {')'}], [{@subj_type={'subj_type', 0x3d, '}:'}}, {@obj_role}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x8, 0x65, 0x37, 0x31, 0x35, 0x30, 0x65], 0x2d, [0x30, 0x31, 0x33, 0x33], 0x2d, [0x36, 0x60, 0x62, 0x61], 0x2d, [0x62, 0x35, 0x64, 0x34], 0x2d, [0x4e, 0x65, 0x39, 0x37, 0x34, 0x32, 0x65, 0x65]}}}, {@obj_user}, {@pcr={'pcr', 0x3d, 0x22}}, {@obj_user}]}) fchmodat(r2, &(0x7f0000000380)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x8, 0x2, 0x6, 0xff, 0x0, 0x80000001, 0x4cea1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x8, 0x7}, 0xa04, 0x10000, 0x9, 0x5, 0x81c1, 0x4637, 0x0, 0x0, 0x9, 0x0, 0x3f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_PERIOD(r3, 0x40082404, &(0x7f0000000480)=0x81) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) r4 = perf_event_open$cgroup(&(0x7f0000000540)={0x1, 0x80, 0x6, 0x8, 0x0, 0x5, 0x0, 0x1, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x1, @perf_bp={&(0x7f0000000500), 0x4}, 0x10, 0x81, 0x7fffffff, 0x7, 0x3f, 0x80000000, 0x40, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000005c0)='^\'/') ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x10000) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000001b80), 0x200, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000001c40)={0x0, @in={{0x2, 0x4e23, @loopback}}}, 0x84) [ 1086.872112] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1086.872112] [ 1086.906960] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1086.906960] 23:35:13 executing program 0: socketpair(0x26, 0x5, 0x3, 0x0) 23:35:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000110000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020f00090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:13 executing program 4: syz_open_dev$sg(&(0x7f00000000c0), 0x7c, 0xb6542) 23:35:13 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x280000, 0x0) 23:35:13 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000000180)=0x4, 0x4) 23:35:13 executing program 4: syz_open_dev$vim2m(0x0, 0x0, 0x2) 23:35:13 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000002", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:13 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000180)={&(0x7f00000000c0), 0x14, &(0x7f0000000140)={0x0}}, 0x0) 23:35:13 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue1\x00'}) [ 1087.241553] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1087.241553] [ 1087.264602] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1087.264602] 23:35:13 executing program 4: syz_mount_image$vxfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f0000000840)="d56c", 0x2, 0xffff}, {&(0x7f00000009c0)='b', 0x1, 0xfffffffffffffffb}], 0x0, 0x0) 23:35:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000021000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:13 executing program 0: syz_mount_image$reiserfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, &(0x7f0000000540), 0x0, &(0x7f0000000580)={[{@notail}]}) [ 1087.412872] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1087.412872] 23:35:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000120000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:13 executing program 1: fchownat(0xffffffffffffffff, 0x0, 0xee01, 0xee01, 0x1000) 23:35:13 executing program 4: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x10140, 0x0) 23:35:13 executing program 0: socketpair(0x11, 0xa, 0xf0, 0x0) 23:35:13 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000d", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1087.470419] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1087.470419] 23:35:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000022300090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:13 executing program 0: syz_mount_image$reiserfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000680)='g@', 0x2, 0x7fffffff}], 0x0, 0x0) 23:35:13 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) bind$802154_dgram(r0, &(0x7f0000000240), 0x14) 23:35:13 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x402c5342, &(0x7f0000000380)) 23:35:13 executing program 0: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x210002) [ 1087.658902] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1087.658902] [ 1087.682916] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1087.682916] 23:35:13 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000010", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1087.753963] Unsupported ieee802154 address type: 0 23:35:14 executing program 4: syz_open_dev$dri(0x0, 0x0, 0x0) getsockopt$CAN_RAW_FILTER(0xffffffffffffffff, 0x65, 0x1, 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) [ 1087.796603] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1087.796603] [ 1087.821024] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1087.821024] 23:35:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000130000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:14 executing program 0: r0 = syz_mount_image$msdos(&(0x7f00000000c0), &(0x7f00000001c0)='./file0\x00', 0xffc00807, 0x2, &(0x7f0000000240)=[{&(0x7f0000000040)="040800090000ff01e66174000404090a0200027400f8", 0x16}, {&(0x7f00000004c0)="dbed7d4cac17", 0x6, 0x1f}], 0x0, &(0x7f0000000280)={[{@fat=@discard}]}) getpgrp(0x0) mkdirat(r0, &(0x7f0000000080)='./file0\x00', 0x0) r1 = open(&(0x7f000054eff8)='./file0\x00', 0x0, 0x0) unlinkat(r1, &(0x7f0000000200)='./file0\x00', 0x200) syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(0x0, 0x0, &(0x7f0000000900)={{}, {}, [], {}, [{}]}, 0x2c, 0x0) lseek(0xffffffffffffffff, 0x0, 0x0) pipe(&(0x7f00000001c0)) 23:35:14 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_PROBE_HOST(r0, 0x5385, &(0x7f0000000080)={0x9f, ""/159}) 23:35:14 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000014", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:14 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000028202090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:14 executing program 4: socket(0x2, 0x0, 0xfffffffd) 23:35:14 executing program 1: process_vm_writev(0x0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/96, 0x60}, {0x0}], 0x2, 0x0, 0x0, 0x0) 23:35:14 executing program 0: pselect6(0x40, &(0x7f0000000940), 0x0, 0x0, 0x0, &(0x7f0000000a80)={0x0}) 23:35:14 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, &(0x7f0000000080)) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, 0x0) getsockopt$CAN_RAW_FD_FRAMES(0xffffffffffffffff, 0x65, 0x5, 0x0, &(0x7f00000001c0)) getsockopt$CAN_RAW_JOIN_FILTERS(0xffffffffffffffff, 0x65, 0x6, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000300), 0x0, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) [ 1088.076802] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1088.076802] [ 1088.089565] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1088.089565] 23:35:14 executing program 4: add_key$fscrypt_v1(0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffa) 23:35:14 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010000017", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:14 executing program 4: syz_read_part_table(0x8001, 0x0, 0x0) openat$hwrng(0xffffffffffffff9c, 0x0, 0x10000, 0x0) [ 1088.213695] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1088.213695] [ 1088.222719] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1088.222719] 23:35:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000001f0000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:14 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14}, 0x14}}, 0x0) 23:35:14 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x18, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_SOCKETS={0x4}]}, 0x18}}, 0x0) 23:35:14 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020003090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:14 executing program 1: process_vm_writev(0x0, &(0x7f0000001b00)=[{&(0x7f0000000040)=""/219, 0xdb}], 0x1, &(0x7f00000017c0)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9, 0x0) [ 1088.399574] nbd: must specify an index to disconnect 23:35:14 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000bf", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1088.447589] nbd: must specify an index to disconnect [ 1088.466201] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1088.466201] 23:35:14 executing program 4: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040), 0x44000, 0x0) [ 1088.552696] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1088.552696] 23:35:15 executing program 0: r0 = socket(0xa, 0x5, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f00000001c0), r0) 23:35:15 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f0000000000), r0) 23:35:15 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000200000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:15 executing program 4: r0 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$update(0x2, r0, 0x0, 0x0) 23:35:15 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020005090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:15 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000fe", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1089.085703] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.085703] [ 1089.094920] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.094920] 23:35:15 executing program 1: futimesat(0xffffffffffffffff, &(0x7f0000000340)='./file0/file0\x00', 0x0) 23:35:15 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000001780)={0x18, 0x0, 0x4, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_PMSR_ATTR_PEERS={0x4}]}, 0x18}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001940), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000001b40), r0) 23:35:15 executing program 4: syz_mount_image$qnx4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)) [ 1089.213551] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.213551] 23:35:15 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_PORT_INFO(r0, 0x40a85323, &(0x7f0000000100)={{0x80}, 'port1\x00'}) 23:35:15 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0x61480, 0x0) 23:35:15 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x25, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:15 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x43}, 0xc, &(0x7f00000000c0)={&(0x7f0000000140)={0x14}, 0x14}}, 0x0) 23:35:15 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000230000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1089.298621] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.298621] 23:35:15 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020006090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:15 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$qnx4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)='\v', 0x1, 0x7}], 0x10000, &(0x7f00000002c0)={[], [{@obj_user}, {@pcr}]}) perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) 23:35:15 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, &(0x7f0000002740), 0x4) 23:35:15 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x2) syz_mount_image$qnx4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x180, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="0bf177ba478384d3396c9028347779e3e233a54b25637d43e6", 0x19, 0x7}], 0x0, &(0x7f00000002c0)={[{':#'}, {'^\'/'}, {}, {')'}]}) perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x8, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x1, @perf_bp={&(0x7f0000000500), 0x4}, 0x10, 0x81, 0x7fffffff, 0x7, 0x3f, 0x80000000, 0x40, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) 23:35:15 executing program 4: r0 = openat$vnet(0xffffffffffffff9c, &(0x7f00000000c0), 0x2, 0x0) write$vhost_msg_v2(r0, &(0x7f0000000380)={0x2, 0x0, {0x0, 0x0, 0x0}}, 0x48) [ 1089.442889] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.442889] [ 1089.472582] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.472582] 23:35:15 executing program 1: syz_open_dev$sg(&(0x7f0000000100), 0x200, 0x210080) 23:35:15 executing program 0: inotify_add_watch(0xffffffffffffffff, 0x0, 0x92000285) 23:35:15 executing program 4: syz_read_part_table(0x0, 0x1, &(0x7f0000000380)=[{0x0, 0x0, 0xefc}]) [ 1089.613594] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.613594] [ 1089.619908] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.619908] [ 1089.639269] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.639269] 23:35:15 executing program 4: socketpair(0x22, 0x0, 0x8f7, 0x0) 23:35:15 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0xbf, 0x8000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:15 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) read$snapshot(r0, &(0x7f0000000340)=""/199, 0xc7) 23:35:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000003f0000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1089.775314] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.775314] 23:35:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020007090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:16 executing program 0: r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, &(0x7f00000004c0)={'batadv_slave_1\x00'}) 23:35:16 executing program 4: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, 0x0) 23:35:16 executing program 1: r0 = add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f00000000c0)={'fscrypt:', @desc2}, &(0x7f0000000100)={0x0, "6e0018e1dfec6591aff4855a6e97e71d950f1be72b91626051945ca718fd9ff6332f22ba527813322bca2e1f4f4e51241e7fe8bebcf53524f0ddbeb5b03cf0a6"}, 0x48, 0xfffffffffffffffd) add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, r0) 23:35:16 executing program 0: r0 = fork() process_vm_writev(r0, &(0x7f0000000400)=[{0x0}, {0x0}, {&(0x7f00000001c0)=""/213, 0xd5}], 0x3, &(0x7f00000007c0)=[{&(0x7f0000000480)=""/143, 0x8f}, {&(0x7f0000000540)=""/170, 0xaa}, {0x0}], 0x3, 0x0) 23:35:16 executing program 1: syz_mount_image$vxfs(0x0, &(0x7f0000000800)='./file0/file0\x00', 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f0000000840)="d56c", 0x2, 0xffff}, {&(0x7f00000009c0)='b', 0x1, 0xfffffffffffffffb}], 0x0, 0x0) 23:35:16 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_LOW_DMA(r0, 0x227a, &(0x7f0000000000)) [ 1089.922548] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1089.922548] 23:35:16 executing program 4: socketpair(0x11, 0xa, 0x28000, 0x0) 23:35:16 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_PEER_MEASUREMENT_START(r0, &(0x7f00000018c0)={0x0, 0x0, &(0x7f0000001880)={&(0x7f0000001780)={0x14, 0x0, 0x4, 0x0, 0x0, {{}, {@void, @void}}}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000001940), r0) syz_genetlink_get_family_id$wireguard(&(0x7f0000001b40), r0) [ 1090.068577] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1090.068577] [ 1090.077808] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1090.077808] [ 1090.094563] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1090.094563] 23:35:16 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x4}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:16 executing program 1: add_key$keyring(&(0x7f0000000340), 0x0, 0x0, 0x0, 0xfffffffffffffffc) [ 1090.199911] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1090.199911] 23:35:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000400000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1090.288220] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1090.288220] 23:35:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020009090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:16 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000280), 0x9, 0x2) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f00000002c0)) 23:35:16 executing program 0: r0 = socket$rds(0x15, 0x5, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000040)) 23:35:16 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000280), 0x0, 0x2) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f00000000c0)={0x1, @vbi={0x0, 0x0, 0x0, 0x42474752, [], [0x1]}}) 23:35:16 executing program 0: sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, 0x0, 0x0) 23:35:16 executing program 4: openat$vsock(0xffffffffffffff9c, 0x0, 0x0, 0x0) clock_gettime(0x6, &(0x7f0000000040)) 23:35:16 executing program 1: syz_mount_image$qnx4(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280), 0x0, 0x0) syz_mount_image$reiserfs(0x0, 0x0, 0x0, 0x1, &(0x7f0000000880)=[{&(0x7f0000000680)='g@', 0x2, 0x7fffffff}], 0x0, 0x0) 23:35:16 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x2000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:16 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={&(0x7f0000000480), 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_TIMEOUT={0xc}]}, 0x20}, 0x1, 0x0, 0x0, 0x400c801}, 0x0) 23:35:16 executing program 0: openat$hwrng(0xffffffffffffff9c, 0x0, 0x8040, 0x0) [ 1090.506051] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1090.506051] 23:35:16 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f00000007c0), 0x109240, 0x0) [ 1090.620006] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1090.620006] [ 1090.646159] nbd: must specify an index to disconnect [ 1090.667950] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1090.667950] [ 1090.687926] nbd: must specify an index to disconnect 23:35:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000480000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1090.743539] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1090.743539] 23:35:17 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000b090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:17 executing program 1: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r0, 0x84, 0x6, 0x0, 0x0) 23:35:17 executing program 0: syz_open_dev$sg(&(0x7f00000000c0), 0x0, 0x20880) 23:35:17 executing program 4: add_key$fscrypt_v1(&(0x7f0000000080), &(0x7f0000000100)={'fscrypt:', @desc4}, &(0x7f0000000240)={0x0, "f34ec420e09cfb70a5d65de9b6750dcb30904fe2c6b051ff8f8724c86ef914153274d2431d7506d59f002afebae587ada7f752512806212491f3c183b9cfa413"}, 0x48, 0xfffffffffffffffb) 23:35:17 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x4000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1090.930695] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1090.930695] 23:35:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000004c0000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:17 executing program 1: ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) openat$null(0xffffffffffffff9c, &(0x7f0000001b80), 0x0, 0x0) 23:35:17 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x6000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:17 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x9, 0x2) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f00000003c0)={0xc82, 0x47524247, 0x0, @stepwise}) 23:35:17 executing program 0: r0 = socket$inet_dccp(0x2, 0x6, 0x0) ioctl$ifreq_SIOCGIFINDEX_batadv_mesh(r0, 0x8933, &(0x7f0000000080)) 23:35:17 executing program 1: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_LOOPBACK(r0, 0x65, 0x3, 0x0, &(0x7f0000000780)) [ 1091.133001] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1091.133001] [ 1091.159247] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1091.159247] 23:35:17 executing program 4: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) inotify_add_watch(r0, 0x0, 0x101) [ 1091.304960] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1091.304960] [ 1091.319012] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1091.319012] 23:35:17 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000f090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:17 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_ERR_FILTER(r0, 0x65, 0x2, &(0x7f0000000380), 0x4) 23:35:17 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x5c600, 0x0) 23:35:17 executing program 4: syz_mount_image$qnx4(0x0, &(0x7f00000001c0)='./file0\x00', 0x180, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="0bf177ba478384d3396c9028347779e3e233a54b25637d43e6bec9fe742d6ecf60fe9f71", 0x24, 0x7}], 0x0, &(0x7f00000002c0)={[], [{@subj_type={'subj_type', 0x3d, '}:'}}, {@obj_role}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x0, 0x65], 0x2d, [0x0, 0x0, 0x0, 0x33], 0x2d, [0x36, 0x0, 0x62, 0x61], 0x2d, [0x0, 0x0, 0x64], 0x2d, [0x4e, 0x0, 0x39]}}}]}) 23:35:17 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x6c00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000600000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:17 executing program 0: syz_open_procfs$namespace(0x0, &(0x7f0000002c40)='ns/user\x00') 23:35:17 executing program 1: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000001c00)={0x1a, 0x0, 0x0, 0xff, 0x8, 0x2}, 0x10) 23:35:17 executing program 4: socket(0x15, 0x5, 0x0) [ 1091.546447] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1091.546447] 23:35:17 executing program 4: r0 = socket(0xa, 0x5, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, 0x0, 0x0) [ 1091.653194] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1091.653194] [ 1091.664673] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1091.664673] 23:35:17 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f00000005c0), 0x0, 0x0) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, 0x0) 23:35:17 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x80101, 0x0) openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) 23:35:17 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020020090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:17 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x7a00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000680000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:18 executing program 0: socketpair(0x23, 0x0, 0xff, 0x0) 23:35:18 executing program 4: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 23:35:18 executing program 1: sendmsg$NL80211_CMD_GET_MESH_CONFIG(0xffffffffffffffff, 0x0, 0x342044c8e71fe672) 23:35:18 executing program 0: setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000000), 0xfffffffffffffe9d) [ 1091.881739] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1091.881739] 23:35:18 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x7f00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000006c0000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:18 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_DEBUG(r0, 0x227e, &(0x7f0000000140)) [ 1091.965015] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1091.965015] 23:35:18 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, 0x0, 0x0) 23:35:18 executing program 1: clock_gettime(0x0, &(0x7f0000000380)) futimesat(0xffffffffffffffff, 0x0, 0x0) fchmodat(0xffffffffffffffff, 0x0, 0x0) readlinkat(0xffffffffffffffff, 0x0, 0x0, 0x0) fanotify_mark(0xffffffffffffffff, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vxfs(&(0x7f00000007c0), 0x0, 0x7fff, 0x2, &(0x7f0000000a40)=[{&(0x7f0000000840)}, {0x0, 0x0, 0xfffffffffffffffb}], 0x400, &(0x7f0000000ac0)) [ 1092.112554] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1092.112554] [ 1092.151672] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1092.151672] 23:35:18 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) ioctl$vim2m_VIDIOC_REQBUFS(r0, 0xc0145608, &(0x7f0000000000)) 23:35:18 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8002}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:18 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020023090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:18 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000600)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x1) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 23:35:18 executing program 1: waitid(0x3, 0x0, 0x0, 0x40000003, 0x0) [ 1092.258258] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1092.258258] 23:35:18 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f00000001c0), 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000200)={0x0, 0x1, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1c556ec4"}, 0x0, 0x0, @userptr}) 23:35:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000740000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:18 executing program 1: process_vm_writev(0xffffffffffffffff, &(0x7f0000001240)=[{&(0x7f0000000040)=""/103, 0x67}], 0x1, &(0x7f0000002500)=[{&(0x7f0000001280)=""/32, 0x20}], 0x1, 0x0) [ 1092.412162] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1092.412162] 23:35:18 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8003}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:18 executing program 0: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)) 23:35:18 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={&(0x7f0000000040), 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x14}, 0x14}}, 0x0) [ 1092.546412] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1092.546412] [ 1092.570472] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1092.570472] 23:35:18 executing program 4: process_vm_writev(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000002500)=[{0x0}], 0x1, 0x0) r0 = fork() process_vm_writev(r0, &(0x7f0000002ac0)=[{&(0x7f0000002680)=""/230, 0xe6}], 0x1, &(0x7f0000002a00)=[{&(0x7f0000002b40)=""/107, 0x6b}], 0x1, 0x0) 23:35:18 executing program 0: openat$md(0xffffffffffffff9c, &(0x7f0000000080), 0x82, 0x0) 23:35:18 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000001a80)={0x630, 0x0, 0x0, "abc39aa9a655ff8d1957e31e7d4a633663c50918bcb8f022b3a5021553f1737b94654f8099f550f0faefc800dc849b066c0bf1922087efa385a3174d0d43cc2977ac150a29a188c82192c4c23c6b7077a51075c75fc2f7b0f6f41af7c0336a3eb944277d104e1fc4b8771cf05d3793804e282c2bee1d38e23eb1a3c55f084e15604bf953a41b5fa6f2d29ab55b2bd16b6fe037acddeba5997bbdd9bf2cebd8941de6db07e4b33d242bbaa03ce03778ff0e1311b7856b27aff0ec99aa7d93b89ee502438c210b50d87383a6dcc5c3a8fd8547c7e326fdc8a95e0435af852ee19cc64faf32a4b56f634badc74f6beab528c8d8d9c477a2ff04a78fb65479e732fefc6ff50676a77d51c3650eb89879b41a58cfae90f65bcf0b6c5aefa93386ea54a8e37dabd68befbddcc3f7a1bbf6a59fd45a262ebd19eee0b33c38bab8dc7e000b4dd654da79c8fe5a4552eca875ea2ce58fddaa39f6a7cd400c1268e167345b936130c9f465146161656a156bc56fe42b502862c8ea7e7c84fff7e134785ad49e2622c002a5c80d014eee56320f9b23fee9f6cc1640be94bf808934a20b0a9b60d1fc2ac219aba0490a0636bf5eb73af677f7a7876009f60c533a87b9c6e0f2cc86fdd83e8f9d818d48aa2fd9f60a4a191cfdf6c443ab337865f62f1ea94fc1c12d27021a91db1ccf9a71fe116b8f70dea09c3b527d05d11be3512be12616508543ea5eca22355c04b86ed8cd958ca1a34395885bab36fbb316310d61d75cf7281cdc441f320134d6241e560df4d718cb0d3b7ffa4a203d2e110341eb29705e888509dee74995e07308de0103f8f60a229ee310d61d926ec8da777affddf396f0803983003983c124242a90b2449d98219c7aed81e488c706647abd07df4104497ad1c25719db796c4d00d466cf7fc6e090b94247f2494eb0189cfb9afe3813d013f3206d9e08df268343c6a01382afacd5995cecb9c9a2956301c66a2a9d707e1ef408f5a725c26e284397be4c462e1bf8b1ecf57771dc33300e0938270c6b95126fa11123ea9d06121b515aef14bfa1f8da05edbf2b57d9a95a9eeaea00ac56b9a780ef8fa2318bbb1f32625925246496fa6fc9f2d225489d62ec6c853372a4e6d0b693ac83aa7e59f3f6d009d5e13eefff0341e7dc60380cd4a485ee909e677b40e0346aae6cebf5616e2ca151393661498081e74d3c6f295d57e835f6f37917a559b7546e55d3d7930ff4b4f74c659f112fdfcf45ef1c13cd5d179d99457b9e47517871a2648bfd0636b4ac7f165e70a88fdc46f98fb6a507b9b0e4cf8b14b6e593bc0ff0a39303054471852b1ea3adbe2d16146b49eb39eb252ed46f1611dc9e8dc1001b2b07ff786d8cda0ec8c1a780bdf37423a9c2660a77101821e5553db8b492be84722a21874018d44b0b548cde86e2cfb7a91e9047be5c658a74909e229c1e99607461dfdf19fca125f6234d602fe1f885ae84c643d9f8424cf2ab626f39fe67735f6ef3cd3ce276cf4c8ea1dc94fa3ee0fc107489119f20cb960f65f21a951c04abfbaa0be50f145f6f3f04b7925d393cc94f3d20429542f1d67c20bf14a3b64451f5de022aed75d79a360e9f0104ee4f216c05e4f5e750ab206942e33061e1031c143a6adb52eeb56553b61d429b98aed0758f3ef15f250b079b674f8fd871276d9894a60ab1a7eef129f7c7bbb14e7db97e0a7e0522641b1c9edc31be6699d6906d15ca9e69cb6c90b28cc91f7249c8218f82bd804ccdde5842936ad8d6ceee90f7c23a70478fdf02750e7fffa6db0c358bc71c223e51e81b1f47ac4c25eaafde2d6157e7d1df14374929fa0e56e83cf5d762a64a439912a314185656d606bbf3d7c75d01253f7067ea5d4f65b07043a68f7cfd0663efe1645ffe43eeb7e4dce70f2bc6e401b3df6c8fea6adfdac074dd545548f5d00fc0b528e685a621ff6ac8856f6f839bbb67566d7790890775db8def57ca6faf20e77b8006c533ae8899ce7b5ffbb5febd32e90f694625183e423c28e8deefc9e28d1de1939652ad49059ac6d6fe6b92b05e4269e4e7d07726ae9797f5eb8f40a89a6809cf507e1020a35190111a72b91ab181bbaf0b118eac89f2a33b73e13b0311e72ffadd429114ae541e95b8712ccbe33dc8ea22461fcf5da436fe7bea55161bf3b85aa23c0e977ea039910b8da76a6f8bc9de74c26190349a18198685bb40f52513e7b7bb0f711443f550d032255262d3"}) 23:35:18 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002003f090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1092.698599] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1092.698599] 23:35:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000007a0000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:19 executing program 0: r0 = socket$inet(0x2, 0x5, 0x0) setsockopt$inet_int(r0, 0x0, 0x12, &(0x7f0000000040)=0x8000, 0x4) 23:35:19 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8004}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:19 executing program 4: syz_mount_image$qnx4(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$reiserfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000580)) [ 1092.881597] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1092.881597] 23:35:19 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2, &(0x7f00000000c0)=[{0x25}, {0x6, 0x0, 0x0, 0x7ffffff6}]}) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x18, 0xd9f, 0x0) 23:35:19 executing program 0: socketpair(0x3, 0x0, 0x0, 0x0) [ 1092.961308] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1092.961308] [ 1092.991836] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1092.991836] 23:35:19 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_INFO(r0, 0x40bc5311, &(0x7f0000000000)={0x0, 0x0, 'client0\x00', 0x0, "e656ffb491ef19c5", "f98172bfa35a1c753efd0d66c85e84748d95c26a17719b1c0b3bade4574e0543"}) 23:35:19 executing program 4: syz_mount_image$qnx4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vxfs(0x0, &(0x7f0000000800)='./file0/file0\x00', 0x0, 0x1, &(0x7f0000000a40)=[{&(0x7f00000009c0)='b', 0x1, 0xfffffffffffffffb}], 0x0, 0x0) 23:35:19 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020040090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:19 executing program 0: add_key(&(0x7f0000000000)='.dead\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff) 23:35:19 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8005}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:19 executing program 1: r0 = inotify_init() inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0x200) prctl$PR_GET_TID_ADDRESS(0x28, &(0x7f0000000000)) openat$vsock(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) ioctl$vim2m_VIDIOC_G_FMT(0xffffffffffffffff, 0xc0d05604, 0x0) [ 1093.207839] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1093.207839] 23:35:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000c0ed0000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:19 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x210001, 0x0) 23:35:19 executing program 4: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH(r0, 0xd0009411, 0x0) 23:35:19 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$mixer_OSS_GETVERSION(r0, 0x80044d76, &(0x7f00000005c0)) 23:35:19 executing program 0: r0 = socket(0xa, 0x5, 0x0) ioctl$sock_inet6_udp_SIOCOUTQ(r0, 0x5411, &(0x7f00000001c0)) 23:35:19 executing program 4: waitid(0x0, 0x0, &(0x7f00000008c0), 0x0, 0x0) 23:35:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setstatus(r0, 0x4, 0x2800) syz_genetlink_get_family_id$tipc(&(0x7f0000000280), r0) 23:35:19 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8006}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1093.453607] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1093.453607] [ 1093.529220] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1093.529220] [ 1093.564833] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1093.564833] 23:35:19 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0, 0x2c}}, 0x0) 23:35:19 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000340), 0x2, 0x0) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000400)={0x3, 0x40, 0xfa00, {{0xa, 0x0, 0x0, @dev}, {0xa, 0x0, 0x0, @private0}}}, 0x48) 23:35:19 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020282090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:19 executing program 1: openat$bsg(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = fork() sched_getaffinity(r0, 0x8, &(0x7f0000000000)) [ 1093.663415] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1093.663415] 23:35:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000fff00000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:20 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8007}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:20 executing program 0: openat$vsock(0xffffffffffffff9c, &(0x7f0000001a40), 0x155001, 0x0) 23:35:20 executing program 4: r0 = add_key$fscrypt_v1(&(0x7f00000001c0), &(0x7f0000000200)={'fscrypt:', @auto=[0x37, 0x35, 0xb, 0x0, 0x32, 0x6a]}, &(0x7f0000000240)={0x0, "09aa146e579843fe1577c167c822f208ac5956da6eb7fa3ff7cb2db3ef397d44d5de33fff740cbf3df6f81e3725ea45e5e16ad2c0000f067406281741df6439b"}, 0x48, 0xfffffffffffffffe) keyctl$setperm(0x5, r0, 0x0) [ 1093.811335] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1093.811335] 23:35:20 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r0, 0xd000943e, 0x0) 23:35:20 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020fff090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:20 executing program 4: syz_open_dev$dri(&(0x7f0000000080), 0x0, 0x4200) 23:35:20 executing program 0: ioctl$sock_ipv6_tunnel_SIOCDEL6RD(0xffffffffffffffff, 0x89fa, &(0x7f0000000080)={'ip6gre0\x00', 0x0}) clock_gettime(0x0, &(0x7f0000000280)) 23:35:20 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8008}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1094.019533] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.019533] 23:35:20 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000000080)={0x1, 0x0, 0x0, '4'}) 23:35:20 executing program 4: r0 = fork() process_vm_writev(r0, &(0x7f0000000400)=[{&(0x7f00000001c0)=""/213, 0xd5}], 0x1, &(0x7f00000007c0)=[{0x0}, {&(0x7f0000000540)=""/170, 0xaa}], 0x2, 0x0) 23:35:20 executing program 0: symlinkat(&(0x7f0000000640)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000680)='./file0\x00') [ 1094.117875] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.117875] [ 1094.145925] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.145925] 23:35:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000fff0000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:20 executing program 1: r0 = socket(0xa, 0x5, 0x0) getsockopt$WPAN_SECURITY(r0, 0x0, 0x1, &(0x7f0000000000), &(0x7f0000000040)=0x4) 23:35:20 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8009}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:20 executing program 4: openat$vim2m(0xffffffffffffff9c, 0x0, 0x2, 0x0) openat$zero(0xffffffffffffff9c, &(0x7f0000000700), 0xe140, 0x0) 23:35:20 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020002090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:20 executing program 0: r0 = add_key$keyring(&(0x7f0000000340), &(0x7f0000000380)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$update(0x2, r0, &(0x7f00000003c0)='?', 0x1) 23:35:20 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000880), 0x0, 0x0) read$snapshot(r0, 0x0, 0x0) [ 1094.372001] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.372001] 23:35:20 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), 0x0) 23:35:20 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f00000000c0), 0x800000, 0x2) ioctl$vim2m_VIDIOC_PREPARE_BUF(r0, 0xc058565d, &(0x7f0000000180)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "65609a7e"}, 0x0, 0x0, @userptr}) 23:35:20 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={0x0}}, 0x0) 23:35:20 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)=ANY=[@ANYBLOB='0'], 0x4c}}, 0x0) 23:35:20 executing program 0: syz_mount_image$qnx4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x180, 0x1, &(0x7f0000000280)=[{0x0}], 0x0, &(0x7f00000002c0)={[{':#'}, {'^\'/'}, {}, {')'}]}) [ 1094.542151] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.542151] [ 1094.567710] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.567710] 23:35:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000f0ff0000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:20 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f00000001c0), 0x0, 0x2) ioctl$vim2m_VIDIOC_QUERYBUF(r0, 0xc0585609, &(0x7f0000000200)={0x0, 0x0, 0x4, 0x0, 0x0, {0x77359400}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "1c556ec4"}, 0x0, 0x0, @userptr}) 23:35:20 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) getsockopt$inet_tcp_buf(r0, 0x6, 0x0, 0x0, 0x0) 23:35:20 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800b}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020003090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:21 executing program 1: keyctl$search(0xa, 0x0, 0x0, 0x0, 0xfffffffffffffff8) 23:35:21 executing program 0: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000580), &(0x7f0000000600)={&(0x7f00000005c0), 0x8}) 23:35:21 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, @buffer={0x0, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) 23:35:21 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800c}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1094.787388] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.787388] 23:35:21 executing program 1: socketpair(0xb, 0x0, 0x0, 0x0) 23:35:21 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, 0x0) [ 1094.869437] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.869437] 23:35:21 executing program 4: clock_gettime(0x0, &(0x7f0000000280)) [ 1094.961292] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1094.961292] 23:35:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000200001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:21 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800d}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:21 executing program 1: openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) [ 1095.038649] Unknown ioctl 35314 23:35:21 executing program 0: r0 = socket(0xa, 0x5, 0x0) getsockopt$PNPIPE_IFINDEX(r0, 0x113, 0x2, 0x0, 0x0) [ 1095.075066] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.075066] [ 1095.142485] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.142485] 23:35:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020004090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:21 executing program 4: socketpair(0x27, 0x0, 0x0, 0x0) 23:35:21 executing program 1: prctl$PR_SET_NAME(0xf, &(0x7f0000000000)='#%/b[\x00') 23:35:21 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x8c001, 0x0) 23:35:21 executing program 4: pselect6(0x40, &(0x7f0000000940), 0x0, 0x0, &(0x7f0000000a00)={0x77359400}, 0x0) [ 1095.266073] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.266073] 23:35:21 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000040)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000), 0x111}}, 0x20) 23:35:21 executing program 1: syz_open_dev$cec(&(0x7f0000000000), 0x2, 0x2) 23:35:21 executing program 0: ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, 0x0) syz_mount_image$qnx4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x180, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="0bf177ba478384d3396c9028347779e3e233a54b25637d43e6bec9fe742d6ecf60fe9f711719d1c55b46e20cf79f70eb", 0x30, 0x7}], 0x10000, &(0x7f00000002c0)={[{'^\'/'}, {')'}], [{@subj_type={'subj_type', 0x3d, '}:'}}, {@obj_role}, {@obj_user}]}) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000600)) 23:35:21 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_SET_KEEP_ORPHAN(r0, 0x2287, &(0x7f00000000c0)) 23:35:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000400001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:21 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x800f}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1095.441634] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.441634] 23:35:21 executing program 1: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000080), 0x1) [ 1095.545045] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.545045] [ 1095.596355] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.596355] 23:35:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020005090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:21 executing program 0: setsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 23:35:21 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8023}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:21 executing program 1: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x680, 0x0) [ 1095.721400] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.721400] [ 1095.813404] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.813404] [ 1095.907294] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1095.907294] 23:35:22 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(0x0, 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r1, 0x1}, 0x14}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000900), 0xffffffffffffffff) 23:35:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000001000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:22 executing program 0: openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x2c000, 0x0) 23:35:22 executing program 1: sched_getaffinity(0x0, 0x8, &(0x7f00000000c0)) 23:35:22 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0xbf00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020006090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:22 executing program 0: getgroups(0x1, &(0x7f0000000700)=[0xee01]) [ 1096.263673] nbd: must specify an index to disconnect 23:35:22 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x6) [ 1096.308255] nbd: must specify an index to disconnect [ 1096.322974] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1096.322974] [ 1096.334366] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1096.334366] 23:35:22 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffa) 23:35:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020007090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000ffff1f00001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:22 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="2fc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:22 executing program 0: r0 = fork() process_vm_writev(r0, &(0x7f0000002ac0)=[{&(0x7f0000002680)=""/230, 0xe6}, {&(0x7f0000000100)=""/111, 0x6f}], 0x2, &(0x7f0000002a00)=[{&(0x7f0000002b40)=""/107, 0x6b}, {&(0x7f0000002c80)=""/4096, 0x1000}], 0x2, 0x0) 23:35:22 executing program 1: r0 = fork() process_vm_writev(r0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/72, 0x48}], 0x1, &(0x7f00000007c0)=[{&(0x7f0000000540)=""/170, 0xaa}, {0x0}], 0x2, 0x0) 23:35:22 executing program 4: syz_open_dev$sg(&(0x7f00000000c0), 0xffffffff, 0x0) [ 1096.560171] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1096.560171] [ 1096.565347] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1096.565347] 23:35:22 executing program 1: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={0x0, 0x0, 0x10}, 0x10) 23:35:22 executing program 4: sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) fork() [ 1096.611400] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1096.611400] 23:35:22 executing program 4: syz_mount_image$qnx4(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000140)="06", 0x1, 0xffffffff}], 0xa22000, &(0x7f0000000300)={[], [{@obj_user={'obj_user', 0x3d, '{+'}}]}) syz_mount_image$reiserfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x1, &(0x7f0000000540)=[{&(0x7f0000000440)="9a", 0x1}], 0x41000, &(0x7f0000000580)={[{@notail}]}) syz_mount_image$reiserfs(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x0, &(0x7f0000000880), 0x440081, &(0x7f00000008c0)) 23:35:22 executing program 0: r0 = syz_open_dev$vim2m(&(0x7f0000000280), 0x0, 0x2) ioctl$vim2m_VIDIOC_ENUM_FRAMESIZES(r0, 0xc02c564a, &(0x7f00000002c0)={0x1}) 23:35:22 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SG_GET_SG_TABLESIZE(r0, 0x227f, 0x0) 23:35:22 executing program 1: syz_read_part_table(0x0, 0x0, &(0x7f0000000380)) [ 1096.773931] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1096.773931] [ 1096.811366] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1096.811366] 23:35:23 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020008090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1096.835432] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1096.835432] 23:35:23 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000002000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:23 executing program 4: setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(0xffffffffffffffff, 0x6, 0x16, &(0x7f0000000000)=[@sack_perm, @mss={0x2, 0x81}, @window={0x3, 0x4, 0x1ff}], 0x3) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x9c, r1, 0x400, 0x70bd26, 0x25dfdbff, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x1}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x4}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc}, @NBD_ATTR_SOCKETS={0x44, 0x7, 0x0, 0x1, [{0x8}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8}, {0x8, 0x1, r2}, {0x8}]}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0xab}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x22}]}, 0x9c}, 0x1, 0x0, 0x0, 0x4000000}, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000300)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x2c, r1, 0x300, 0x70bd25, 0x25dfdbff, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x8}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x80000000}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2000c04c}, 0x24000081) sendmsg$BATADV_CMD_GET_DAT_CACHE(0xffffffffffffffff, &(0x7f0000000440)={&(0x7f0000000340), 0xc, &(0x7f0000000400)={&(0x7f0000000380)={0x4c, 0x0, 0x200, 0x70bd29, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_DOWN={0x8, 0x31, 0x1}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x1}, @BATADV_ATTR_VLANID={0x6, 0x28, 0x3}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x2}, @BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x6}, @BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x4c}, 0x1, 0x0, 0x0, 0x4040014}, 0x4004000) r3 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r0) socketpair(0x4, 0x5, 0x9, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000580)={0xffffffffffffffff}) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x70, r3, 0x1, 0x70bd2b, 0x25dfdbfb, {}, [@NBD_ATTR_TIMEOUT={0xc, 0x4, 0x6}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xa}, @NBD_ATTR_SOCKETS={0x2c, 0x7, 0x0, 0x1, [{0x8, 0x1, r2}, {0x8}, {0x8, 0x1, r4}, {0x8, 0x1, r5}, {0x8, 0x1, r2}]}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x309}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x3}]}, 0x70}, 0x1, 0x0, 0x0, 0x400c801}, 0x40004) ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000006c0)) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000700)={@in6={{0xa, 0x4e21, 0x200, @dev={0xfe, 0x80, '\x00', 0x15}, 0x200}}, 0x0, 0x0, 0x3d, 0x0, "b369eea1beeb76d26ac2a4fd6c9e2ed0f398324fdbeae82fb8d09eb73456f407f66a69170d96f5ee61e7b6f666e2f67784ea6eea5906a514bffec94007a3a5d33862bfe0b8dcd6f376d997020e774042"}, 0xd8) syz_genetlink_get_family_id$nl80211(&(0x7f0000000900), 0xffffffffffffffff) 23:35:23 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000ac0), 0x2, 0x0) ioctl$vim2m_VIDIOC_G_FMT(r0, 0xc0d05604, &(0x7f0000000b80)={0x3, @win={{}, 0x0, 0x0, 0x0, 0x0, 0x0}}) 23:35:23 executing program 1: syz_mount_image$reiserfs(&(0x7f00000003c0), &(0x7f0000000400)='./file0\x00', 0x0, 0x0, 0x0, 0x41000, &(0x7f0000000580)) 23:35:23 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="bfc4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1096.962263] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1096.962263] 23:35:23 executing program 0: sendmsg$L2TP_CMD_TUNNEL_GET(0xffffffffffffffff, 0x0, 0x0) 23:35:23 executing program 1: r0 = inotify_init() inotify_add_watch(r0, &(0x7f00000002c0)='./file0\x00', 0x200) [ 1097.032802] nbd: must specify an index to disconnect [ 1097.058466] nbd: must specify an index to disconnect 23:35:23 executing program 4: syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) socketpair(0x0, 0x0, 0x0, 0x0) 23:35:23 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockname(r0, 0x0, 0x0) 23:35:23 executing program 1: kexec_load(0x0, 0x1, &(0x7f00000003c0)=[{0x0, 0x0, 0x0, 0x1085}], 0x1) 23:35:23 executing program 0: openat$mixer(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) [ 1097.145255] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.145255] [ 1097.154765] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.154765] 23:35:23 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020009090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1097.241502] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.241502] [ 1097.272027] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.272027] [ 1097.364485] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.364485] [ 1097.382463] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.382463] 23:35:23 executing program 1: r0 = fork() process_vm_writev(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:35:23 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0xb6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f00000000c0)='./file0\x00') 23:35:23 executing program 4: prctl$PR_SET_NAME(0xf, &(0x7f0000000040)='\xa5\xd1\x91\xc3\xfb\x94d8&\xeb\xe4(]\x98\x9b\xe0\x8a\xe6|)\xab\vsZ\xafo\x1d$\xc3R\xeb \xcb\xdaf\xfa\b\xcduw\xdc\xf5\xdf\xdf\'l=\xb1O\xdc\xa1\f\xd4=a\x98l\x9b\xa0\xae\x03f\xa0\xb6Q\x92\x1f\x1fk\xbe\x1a\xe7]\x8b\x91HH)/\xcem\xbc\xa2\xe8\xc0s\x85') 23:35:23 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000004000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:23 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4255f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1097.436075] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.436075] [ 1097.485728] Scheduler tracepoints stat_sleep, stat_iowait, stat_blocked and stat_runtime require the kernel parameter schedstats=enable or kernel.sched_schedstats=1 23:35:23 executing program 0: recvmsg$can_raw(0xffffffffffffffff, 0x0, 0x80000141) 23:35:23 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000b090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:23 executing program 0: fork() capset(0x0, &(0x7f0000000080)={0x352a, 0x0, 0x5, 0x8, 0x9}) [ 1097.539087] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.539087] [ 1097.551298] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.551298] 23:35:23 executing program 4: syz_mount_image$qnx4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) symlinkat(&(0x7f0000000640)='./file0\x00', 0xffffffffffffff9c, 0x0) 23:35:23 executing program 1: mmap$usbfs(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) [ 1097.643307] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.643307] [ 1097.652734] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.652734] 23:35:23 executing program 0: r0 = openat$md(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000040)) 23:35:23 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000500)={'ip6_vti0\x00', 0x0}) 23:35:23 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000000), 0x410000, 0x0) r1 = syz_mount_image$qnx4(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x3ff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="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", 0xff, 0xcfd}], 0x49000, &(0x7f0000000280)={[{'['}, {'/dev/dlm-control\x00'}, {'\'+'}, {'/dev/dlm-control\x00'}, {']@'}, {'/dev/dlm-control\x00'}, {'/dev/dlm-control\x00'}, {'!(^/-\\'}, {}], [{@subj_user={'subj_user', 0x3d, '&$'}}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@euid_eq={'euid', 0x3d, 0xee00}}]}) clock_gettime(0x0, &(0x7f0000000380)={0x0, 0x0}) futimesat(r1, &(0x7f0000000340)='./file0/file0\x00', &(0x7f00000003c0)={{r2, r3/1000+10000}, {0x77359400}}) fchmodat(r0, &(0x7f0000000400)='./file0/file0\x00', 0x20) readlinkat(r0, &(0x7f00000004c0)='./file0/file0\x00', &(0x7f0000000500)=""/188, 0xbc) fanotify_mark(r0, 0x42, 0x0, r1, &(0x7f0000000600)='./file0/file0\x00') syz_mount_image$vxfs(&(0x7f00000007c0), &(0x7f0000000800)='./file0/file0\x00', 0x7fff, 0x4, &(0x7f0000000a40)=[{&(0x7f0000000840)="d56cd20f66223afc7589634cabdbf5d047c2f1d427fdfb31824cfa5a219dc4f5fe4c941c0666231ee466de066a5afb93449989bd194019cc61586f984ab777ad48b217ead9229cd477ce836b089592ca0d793f6f0976e2fc21fcc11c63a6c73e", 0x60, 0xffff}, {&(0x7f00000008c0)="79f52f81bc1da28ea8433c1330", 0xd, 0xa7dc}, {&(0x7f0000000900)="5424034c613a30e2ee4ef5e68bed22c9e751cebd6d1a43116fcaafb2b54ddd6d300219658e2e44a4b34a7a5c0bafab0ebd3ef75921d843cd8b42e5b258480f9804a91be18e61bf1532e3bcd5dc65da5b2e411c58bd81ca4be6a7d1ae4bc85d4c1971fa03f8eccac924bf50315f9df79b0e4129c9601502c8816ad91a1890fd2651740fc8e6d2db965c7f78edb6123a7aaf18507028befa06e7726f718777dd820f340ab7e2f50e6c6fa1d16dd004938f8304db5ac64386ffec", 0xb9}, {&(0x7f00000009c0)="62e671ca7c5cc808802422e024e716f55741abddec84cfd0dd2400d58a3f1e428617a607c914f7dcfb85abc9a3cd4d6b713eefeb2ea3ab7e4cdd651026c43cd816293425e218862262d1c925b4717cb8c9b824bbf78b312359d1007f83931f333e2b2205b36481b95da8d71089e693942724b27787f4e4bccbd5fb846553b8", 0x7f, 0xfffffffffffffffb}], 0x400, &(0x7f0000000ac0)={[{'^\xb2!:'}], [{@appraise}]}) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b40), 0x30080, 0x0) 23:35:24 executing program 0: socketpair(0x6, 0x0, 0x0, 0x0) 23:35:24 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000006000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:24 executing program 1: openat$vsock(0xffffffffffffff9c, &(0x7f0000000800), 0x80280, 0x0) 23:35:24 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42e5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1097.776962] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.776962] 23:35:24 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r0) [ 1097.863976] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.863976] 23:35:24 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000f090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x2bcf) shutdown(r0, 0x1) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood\x00', 0x9) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 23:35:24 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f0000000180)={0x0, 0x5, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "3ad7dcf9"}}) 23:35:24 executing program 1: r0 = fork() process_vm_writev(r0, &(0x7f0000000400)=[{&(0x7f00000000c0)=""/96, 0x60}, {0x0}, {&(0x7f00000001c0)=""/213, 0xd5}, {&(0x7f00000002c0)=""/174, 0xae}], 0x4, &(0x7f00000007c0)=[{&(0x7f0000000480)=""/143, 0x8f}, {&(0x7f0000000540)=""/170, 0xaa}, {&(0x7f00000006c0)=""/224, 0xe0}], 0x3, 0x0) [ 1097.938576] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.938576] [ 1097.948388] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1097.948388] 23:35:24 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c42f5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:24 executing program 1: delete_module(&(0x7f0000000000)='\x00', 0x0) 23:35:24 executing program 4: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f00000002c0), 0x2, 0x0) ioctl$vim2m_VIDIOC_EXPBUF(r0, 0xc0405610, &(0x7f0000000040)) [ 1098.076425] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.076425] [ 1098.116447] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.116447] 23:35:24 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020023090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:24 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000ffff8000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:24 executing program 4: r0 = fork() process_vm_writev(r0, &(0x7f0000000400)=[{&(0x7f0000000040)=""/72, 0x48}, {&(0x7f00000000c0)=""/96, 0x60}], 0x2, &(0x7f00000007c0)=[{&(0x7f0000000480)=""/143, 0x8f}, {&(0x7f0000000540)=""/170, 0xaa}, {0x0}], 0x3, 0x0) 23:35:24 executing program 1: fork() waitid(0x0, 0x0, 0x0, 0x40000008, 0x0) 23:35:24 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000001c00)={0x1a, 0x305}, 0x10) [ 1098.259627] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.259627] [ 1098.268917] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.268917] 23:35:24 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_DELETE_QUEUE(r0, 0x408c5333, &(0x7f00000001c0)={0x0, 0x0, 0x0, 'queue0\x00'}) [ 1098.361899] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.361899] [ 1098.364133] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.364133] 23:35:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x2bcf) shutdown(r0, 0x1) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood\x00', 0x9) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 23:35:24 executing program 4: r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x1224, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_mount_image$qnx4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x180, 0x1, &(0x7f0000000280)=[{0x0, 0x0, 0x7}], 0x10000, &(0x7f00000002c0)={[{':#'}, {'^\'/'}, {}], [{@subj_type={'subj_type', 0x3d, '}:'}}, {@obj_user}]}) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x8) 23:35:24 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4bf5f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:24 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000f0000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1098.572420] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.572420] 23:35:24 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000001001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:24 executing program 4: syz_mount_image$qnx4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)) clock_gettime(0x0, &(0x7f0000000380)) [ 1098.702170] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.702170] [ 1098.711618] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.711618] 23:35:24 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x2bcf) shutdown(r0, 0x1) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood\x00', 0x9) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) 23:35:24 executing program 4: openat$vsock(0xffffffffffffff9c, 0x0, 0x600400, 0x0) 23:35:25 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f0000000300)=0x80, 0x4) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0xffffffffffffffb5, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x8, &(0x7f00000003c0), 0x4) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[], 0x2bcf) shutdown(r0, 0x1) setsockopt$inet_tcp_TCP_CONGESTION(0xffffffffffffffff, 0x6, 0xd, 0x0, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000040)='westwood\x00', 0x9) recvmsg(r0, &(0x7f0000001440)={0x0, 0xa, &(0x7f00000015c0)=[{&(0x7f0000001600)=""/4096, 0xf99e}], 0x1, 0x0, 0xff96ce4aaaa47475, 0x7115}, 0x1100) [ 1098.845973] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.845973] [ 1098.869904] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.869904] [ 1098.931724] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.931724] [ 1098.959137] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1098.959137] 23:35:25 executing program 1: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, r0) add_key(&(0x7f0000000140)='ceph\x00', 0x0, 0x0, 0x0, r1) 23:35:25 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={0x0, 0x0, &(0x7f0000000640)={&(0x7f00000005c0)={0x14, r1, 0x1}, 0x14}}, 0x0) 23:35:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000140000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:25 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_inet_tcp_SIOCINQ(r0, 0x541b, 0x0) 23:35:25 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46425010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000002001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:25 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$BATADV_CMD_GET_HARDIF(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[], 0x2c}}, 0x0) 23:35:25 executing program 4: r0 = syz_init_net_socket$llc(0x1a, 0x1, 0x0) sendto$llc(r0, 0x0, 0x0, 0x0, &(0x7f0000001c00)={0x1a, 0x0, 0xa3, 0xff, 0x8, 0x2}, 0x10) [ 1099.101144] nbd: must specify an index to disconnect [ 1099.109095] nbd: must specify an index to disconnect 23:35:25 executing program 4: capset(&(0x7f0000000000)={0x20080522}, &(0x7f0000000040)={0x40}) 23:35:25 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_SUBSCRIPTION(r0, 0xc0505350, &(0x7f0000000140)={{0xb9}}) 23:35:25 executing program 1: renameat2(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x3) [ 1099.213930] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.213930] 23:35:25 executing program 1: socketpair(0x2b, 0x1, 0x2, 0x0) 23:35:25 executing program 4: syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 23:35:25 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) getsockopt$CAN_RAW_FD_FRAMES(r0, 0x65, 0x5, 0x0, 0x0) [ 1099.303640] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.303640] [ 1099.317308] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.317308] [ 1099.342119] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.342119] 23:35:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200003f0000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:25 executing program 1: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) sendmsg$802154_dgram(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={0x0}}, 0x0) [ 1099.475002] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.475002] [ 1099.485170] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.485170] 23:35:25 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) r1 = syz_genetlink_get_family_id$nbd(&(0x7f00000004c0), r0) socketpair(0x0, 0x0, 0x0, 0x0) sendmsg$NBD_CMD_DISCONNECT(r0, &(0x7f0000000680)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000640)={&(0x7f00000005c0)={0x2c, r1, 0x1, 0x0, 0x0, {}, [@NBD_ATTR_TIMEOUT={0xc}, @NBD_ATTR_SOCKETS={0xc, 0x7, 0x0, 0x1, [{0x8}]}]}, 0x2c}}, 0x0) 23:35:25 executing program 4: socket(0x25, 0x1, 0x4c) 23:35:25 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c464bf010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000003001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:25 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) [ 1099.602523] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.602523] 23:35:25 executing program 1: openat$nullb(0xffffffffffffff9c, &(0x7f0000001880), 0x0, 0x0) [ 1099.644356] nbd: must specify an index to disconnect [ 1099.683754] nbd: must specify an index to disconnect 23:35:25 executing program 4: clock_gettime(0x0, &(0x7f0000000380)) syz_mount_image$vxfs(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) 23:35:25 executing program 0: perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 1099.749620] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.749620] [ 1099.758453] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.758453] 23:35:26 executing program 1: perf_event_open(&(0x7f00000000c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, 0x0) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000380)) r1 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r1, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect) 23:35:26 executing program 4: openat$bsg(0xffffffffffffff9c, 0x0, 0x101800, 0x0) 23:35:26 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000bf0000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname(r0, 0x0, &(0x7f0000000080)) [ 1099.828454] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.828454] [ 1099.849081] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.849081] 23:35:26 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="7261770300000000000000000000000000000000000000000000000000000000c1030000030000003013000068110000681100006811000068110000681100006012000060120000601200006012000060120000030000000000000000000000000002000000000000000060000000000000004c00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000600000000000000000000000011681100000000000000000000000000000000000000000000000030106367726f75700000000000000000000000000000000000000000000000016000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000140000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000dea5fbb1c268110f6a00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000056a7b525448176b400000000000000000000000000000800000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000005f0000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000b000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000270000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000000000000000000000000000000000000000000000000000000000000000000000000000000000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000e63c6f19b256ecde0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000011000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000093000000000000000000000000000000000000000000000000000000000000000000000000002800727066696c746571fffffffffff400000000000000000000000000000000000000000000000068004354000000000000000000000000000000000000000000000000000200010000000000000000000000007070747000000000000000000000000073797a3100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d000f8000000000000000000000000000000000000000000000000002800727066696c74657200000000000000000000000000000000000000000000000000000000000028004e465155455545000000005500000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a800d0000000000000000000000000000000000000000000000000002800000000000000000000000000000000000000000000000000000000000000feffffff"], 0x1) 23:35:26 executing program 0: r0 = syz_open_dev$ndb(&(0x7f0000000000), 0x0, 0x40982) ioctl$NBD_CLEAR_QUE(r0, 0xab05) [ 1099.935218] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1099.935218] [ 1099.954957] hub 9-0:1.0: USB hub found 23:35:26 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f020000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1100.011449] hub 9-0:1.0: 8 ports detected 23:35:26 executing program 0: bpf$MAP_UPDATE_ELEM(0x2, &(0x7f00000015c0)={0x1, 0x0, 0x0}, 0x20) 23:35:26 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300000200000f0000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:26 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue1\x00'}) [ 1100.153697] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.153697] [ 1100.188201] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.188201] 23:35:26 executing program 4: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000002880)={&(0x7f0000000340)=@ll, 0x80, 0x0}, 0x0) [ 1100.296570] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.296570] [ 1100.331940] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.331940] 23:35:26 executing program 1: syz_mount_image$qnx4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$vxfs(0x0, &(0x7f0000000800)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 23:35:26 executing program 0: capset(&(0x7f0000000000)={0x20071026}, &(0x7f0000000040)={0x0, 0xffffcda7}) 23:35:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000005001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1100.409132] hub 9-0:1.0: USB hub found [ 1100.413265] hub 9-0:1.0: 8 ports detected 23:35:26 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f030000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:26 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname(r0, 0x0, &(0x7f00000001c0)) [ 1100.462323] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.462323] 23:35:26 executing program 1: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000600)=0x14) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x5) ioctl$TIOCVHANGUP(r0, 0x5437, 0x0) 23:35:26 executing program 0: r0 = socket$l2tp6(0xa, 0x2, 0x73) getsockname(r0, 0x0, &(0x7f0000000100)) 23:35:26 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000100000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:26 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x8801) [ 1100.586246] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.586246] [ 1100.591313] mkiss: ax0: crc mode is auto. [ 1100.605197] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.605197] [ 1100.675229] mkiss: ax0: crc mode is auto. 23:35:26 executing program 0: syz_mount_image$vxfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000a40)=[{&(0x7f0000000840)="d5", 0x1}, {&(0x7f00000009c0)='b', 0x1}], 0x0, 0x0) 23:35:27 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x7f, 0x3d, 0x6, 0x0, 0x4, 0x1224, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf7, 0x5, @perf_bp={&(0x7f0000000000), 0xc}, 0x10000, 0x2, 0x3, 0x3, 0xffffffff80000001, 0x1e, 0x2, 0x0, 0x7fffffff, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f00000000c0)=0x2) r1 = perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x3, 0x6, 0xc0, 0x4, 0x0, 0x91, 0x2408, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1, 0x5b2b}, 0x4000, 0x4, 0x1ff, 0x4, 0x7, 0x7, 0x8, 0x0, 0x4, 0x0, 0xffffffffffffff33}, 0xffffffffffffffff, 0x0, r0, 0x3) r2 = syz_mount_image$qnx4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x180, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="0bf177ba478384d3396c9028347779e3e233a54b25637d43e6bec9fe742d6ecf60fe9f711719d1c55b46e20cf79f70ebe9be9237f7b8361abfdae6125c53068ce6", 0x41, 0x7}], 0x10000, &(0x7f00000002c0)={[{'@]\\+-@\'(\x00'}, {':#'}, {}, {'-,)%\'-,\'%\\'}, {','}, {'^\'/'}, {}, {')'}], [{@subj_type={'subj_type', 0x3d, '}:'}}, {@obj_role}, {@fsuuid={'fsuuid', 0x3d, {[0x39, 0x8, 0x65, 0x37, 0x31, 0x35, 0x30, 0x65], 0x2d, [0x30, 0x31, 0x33, 0x33], 0x2d, [0x36, 0x60, 0x62, 0x61], 0x2d, [0x62, 0x35, 0x64, 0x34], 0x2d, [0x4e, 0x65, 0x39, 0x37, 0x34, 0x32, 0x65, 0x65]}}}, {@obj_user}, {@pcr={'pcr', 0x3d, 0x22}}, {@obj_user}]}) fchmodat(r2, &(0x7f0000000380)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x8, 0x2, 0x6, 0xff, 0x0, 0x80000001, 0x4cea1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x8, 0x7}, 0xa04, 0x10000, 0x9, 0x5, 0x81c1, 0x4637, 0x0, 0x0, 0x9, 0x0, 0x3f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000000540)={0x1, 0x80, 0x6, 0x8, 0x0, 0x5, 0x0, 0x1, 0x0, 0x8, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x1, @perf_bp={&(0x7f0000000500), 0x4}, 0x10, 0x81, 0x7fffffff, 0x7, 0x3f, 0x80000000, 0x40, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x10000) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000001b80), 0x200, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r4, 0x84, 0x6, &(0x7f0000001c40)={0x0, @in={{0x2, 0x4e23, @loopback}}}, 0x84) [ 1100.751127] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.751127] [ 1100.785951] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.785951] [ 1100.871819] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.871819] [ 1100.994366] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1100.994366] 23:35:27 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000840), 0x4) 23:35:27 executing program 0: syz_mount_image$reiserfs(&(0x7f0000000600), &(0x7f0000000640)='./file0\x00', 0x0, 0x0, &(0x7f0000000880), 0x0, &(0x7f00000008c0)={[{@jqfmt_vfsv0}, {@tails_small}]}) 23:35:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000006001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:27 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f040000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:27 executing program 1: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x80, 0x7f, 0x3d, 0x6, 0x0, 0x4, 0x1224, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0xf7, 0x5, @perf_bp={&(0x7f0000000000), 0xc}, 0x10000, 0x2, 0x3, 0x3, 0xffffffff80000001, 0x1e, 0x2, 0x0, 0x7fffffff, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x6) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f00000000c0)=0x2) r1 = perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x3, 0x6, 0xc0, 0x4, 0x0, 0x91, 0x2408, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x5, 0x0, @perf_config_ext={0x1, 0x5b2b}, 0x4000, 0x4, 0x1ff, 0x0, 0x7, 0x7, 0x8, 0x0, 0x4}, 0xffffffffffffffff, 0x3, r0, 0x3) r2 = syz_mount_image$qnx4(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x180, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="0bf177ba478384d3396c9028347779e3e233a54b25637d43e6bec9fe742d6ecf60fe9f711719d1c55b46e20cf79f70ebe9be9237f7b8361abfdae6125c53068ce6aa45e10cf99c695d77f0bc66738d257820a9adab43", 0x56, 0x7}], 0x10000, &(0x7f00000002c0)={[{'@]\\+-@\'(\x00'}, {':#'}, {}, {'-,)%\'-,\'%\\'}, {','}, {'^\'/'}, {}, {')'}], [{@subj_type={'subj_type', 0x3d, '}:'}}, {@obj_role}, {@fsuuid={'fsuuid', 0x3d, {[0x0, 0x8, 0x65, 0x37, 0x31, 0x35, 0x30, 0x65], 0x2d, [0x30, 0x31, 0x33, 0x33], 0x2d, [0x36, 0x60, 0x62, 0x61], 0x2d, [0x62, 0x35, 0x64, 0x34], 0x2d, [0x4e, 0x65, 0x39, 0x37, 0x34, 0x32, 0x65, 0x65]}}}, {@obj_user}, {@pcr={'pcr', 0x3d, 0x22}}, {@obj_user}]}) fchmodat(r2, &(0x7f0000000380)='./file0\x00', 0x0) r3 = perf_event_open(&(0x7f0000000400)={0x3, 0x80, 0x8, 0x2, 0x6, 0xff, 0x0, 0x80000001, 0x4cea1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x8, 0x7}, 0xa04, 0x10000, 0x9, 0x5, 0x0, 0x4637, 0x0, 0x0, 0x9, 0x0, 0x3f}, 0x0, 0xe, 0xffffffffffffffff, 0x8) ioctl$PERF_EVENT_IOC_SET_BPF(r3, 0x40042408, 0xffffffffffffffff) r4 = perf_event_open$cgroup(&(0x7f0000000540)={0x1, 0x80, 0x6, 0x8, 0x0, 0x5, 0x0, 0x1, 0x0, 0x8, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x1, @perf_bp={&(0x7f0000000500), 0x4}, 0x10, 0x81, 0x7fffffff, 0x7, 0x3f, 0x80000000, 0x40, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$PERF_EVENT_IOC_SET_FILTER(r4, 0x40082406, &(0x7f00000005c0)='^\'/') ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40082404, &(0x7f0000000600)=0x10000) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000001b80), 0x200, 0x0) setsockopt$inet_sctp6_SCTP_PRIMARY_ADDR(r5, 0x84, 0x6, &(0x7f0000001c40)={0x0, @in={{0x2, 0x4e23, @loopback}}}, 0x84) 23:35:27 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000140000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1101.296394] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1101.296394] [ 1101.305284] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1101.305284] [ 1101.318798] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1101.318798] 23:35:27 executing program 1: syz_open_dev$sg(&(0x7f0000000300), 0x4, 0x101001) 23:35:27 executing program 0: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x2) 23:35:27 executing program 4: bpf$OBJ_GET_PROG(0x7, &(0x7f0000000080)={&(0x7f0000000040)='./file0\x00'}, 0x10) bpf$OBJ_GET_PROG(0x7, &(0x7f0000001200)={&(0x7f00000000c0)='./file0\x00'}, 0x10) 23:35:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000007001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1101.366891] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1101.366891] [ 1101.482981] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1101.482981] [ 1101.492719] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1101.492719] 23:35:27 executing program 4: openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000001ac0), 0x0, 0x0) 23:35:27 executing program 0: syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) 23:35:27 executing program 1: socketpair(0x15, 0x0, 0x0, 0x0) 23:35:27 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000bf0000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:27 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f050000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1101.606256] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1101.606256] 23:35:27 executing program 1: r0 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) ioctl$mixer_OSS_GETVERSION(r0, 0x80044d76, 0x0) 23:35:27 executing program 4: add_key$fscrypt_v1(&(0x7f0000000000), &(0x7f0000000040)={'fscrypt:', @desc3}, &(0x7f0000000080)={0x0, "84b3ad74190226aaee58ff04fc92b69b2733ca9ce4651e437005a25c1a0420e1419e9dac29437808ec2b7132d417d6306a13522a492009092bb08f8dcb622ce8"}, 0x48, 0xffffffffffffffff) 23:35:27 executing program 0: add_key(&(0x7f0000000000)='dns_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffb) [ 1101.701054] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1101.701054] [ 1101.723514] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1101.723514] 23:35:28 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090200000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:28 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000008001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1101.799363] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1101.799363] 23:35:28 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) recvmsg$can_raw(r0, &(0x7f0000002880)={0x0, 0x0, 0x0}, 0x0) 23:35:28 executing program 4: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, "8000"}) ioctl$TCSETA(r0, 0x5406, &(0x7f00000004c0)={0xfff9, 0x0, 0x0, 0xbffa, 0x0, "feffffff1e004000"}) r1 = syz_open_pts(r0, 0x0) ioctl$TCSETSF(r1, 0x5412, &(0x7f0000000100)={0x800000a, 0x0, 0x0, 0x0, 0x0, "21590000d59879c90000000000000000000400"}) 23:35:28 executing program 1: getsockopt$PNPIPE_IFINDEX(0xffffffffffffffff, 0x113, 0x2, 0x0, 0x0) 23:35:28 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x9, 0x2) ioctl$vim2m_VIDIOC_DQBUF(r0, 0xc0585611, &(0x7f0000000680)={0x0, 0x1, 0x4, 0x0, 0x0, {}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c98a950d"}, 0x0, 0x0, @userptr}) [ 1101.913727] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1101.913727] [ 1101.932159] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1101.932159] 23:35:28 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000001c0)='cgroup.controllers\x00', 0x275a, 0x0) write$binfmt_script(r0, &(0x7f0000000040)=ANY=[], 0x208e24b) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r1, &(0x7f0000000440)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r1, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000100)='bbr\x00', 0x4) sendfile(r1, r0, 0x0, 0x7) 23:35:28 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f070000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1102.040459] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1102.040459] [ 1102.065785] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1102.065785] 23:35:28 executing program 1: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, 0x0, 0x0) 23:35:28 executing program 1: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x9, 0x2) ioctl$vim2m_VIDIOC_S_FMT(r0, 0xc0d05605, &(0x7f0000000000)={0x3}) 23:35:28 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090300000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1102.179880] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1102.179880] [ 1102.186617] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1102.186617] 23:35:28 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000009001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005d832, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 1102.309366] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1102.309366] 23:35:28 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005d832, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) [ 1102.441375] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1102.441375] [ 1102.456207] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1102.456207] [ 1102.589142] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1102.589142] [ 1102.750043] audit: type=1800 audit(1621121728.944:121): pid=2759 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed comm="syz-executor.4" name="cgroup.controllers" dev="sda1" ino=14558 res=0 23:35:29 executing program 0: pselect6(0x40, &(0x7f0000000940), 0x0, &(0x7f00000009c0)={0x10000}, 0x0, 0x0) 23:35:29 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f080000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005d832, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 23:35:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090400000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1102.896566] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1102.896566] [ 1102.946549] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1102.946549] 23:35:29 executing program 4: syz_genetlink_get_family_id$wireguard(&(0x7f00000003c0), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000c40), 0xffffffffffffffff) 23:35:29 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000b001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:29 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap(&(0x7f0000000000/0xff5000)=nil, 0xff5000, 0x0, 0x200000005d832, 0xffffffffffffffff, 0x0) clone(0x20002004ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) exit_group(0x0) ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) 23:35:29 executing program 0: r0 = socket$inet_smc(0x2b, 0x1, 0x0) ioctl$sock_ipv6_tunnel_SIOCADD6RD(r0, 0x89f9, &(0x7f0000000140)={'syztnl0\x00', 0x0}) 23:35:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090500000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1103.072362] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.072362] [ 1103.099452] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.099452] 23:35:29 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0b0000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1103.127018] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.127018] 23:35:29 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600008e63b00c001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090600000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:29 executing program 0: r0 = socket$phonet_pipe(0x23, 0x5, 0x2) getsockname(r0, 0x0, &(0x7f0000000140)) 23:35:29 executing program 4: unlinkat(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x0) [ 1103.281982] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.281982] 23:35:29 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080), 0xa0b81, 0x0) openat$vsock(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) [ 1103.344037] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.344037] [ 1103.374835] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.374835] [ 1103.375784] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.375784] 23:35:29 executing program 1: getsockopt$WPAN_WANTACK(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 23:35:29 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000f001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090700000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:29 executing program 4: r0 = syz_open_dev$vim2m(&(0x7f0000000580), 0x0, 0x2) ioctl$vim2m_VIDIOC_QBUF(r0, 0xc058560f, &(0x7f00000005c0)={0x0, 0x0, 0x4, 0x0, 0x0, {0x0, 0x2710}, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, "c71a23f7"}}) 23:35:29 executing program 4: openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, 0x0) syz_genetlink_get_family_id$wireguard(&(0x7f00000003c0), 0xffffffffffffffff) syz_genetlink_get_family_id$nl80211(&(0x7f0000000c40), 0xffffffffffffffff) syz_genetlink_get_family_id$batadv(&(0x7f0000000d80), 0xffffffffffffffff) 23:35:29 executing program 0: bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000440)={0xffffffffffffffff, 0x0, 0x0}, 0x10) 23:35:29 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0c0000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:29 executing program 1: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000001a40), 0x0, 0x0) inotify_rm_watch(r0, 0x0) [ 1103.559745] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.559745] 23:35:29 executing program 0: perf_event_open$cgroup(&(0x7f0000000540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) 23:35:29 executing program 1: syz_mount_image$qnx4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)="0bf177ba478384d3", 0x8}], 0x0, 0x0) 23:35:29 executing program 1: syz_open_dev$sg(&(0x7f0000000040), 0x200000000000, 0x4801) [ 1103.680386] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.680386] [ 1103.711055] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.711055] 23:35:29 executing program 4: syz_open_dev$cec(&(0x7f0000000000), 0x2, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) 23:35:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000010001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:30 executing program 1: keyctl$search(0xa, 0x0, &(0x7f0000000040)='id_resolver\x00', &(0x7f00000000c0)={'syz', 0x3}, 0xfffffffffffffff8) [ 1103.831352] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.831352] [ 1103.841909] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.841909] 23:35:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090800000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:30 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000001c0)={0xf6c}) 23:35:30 executing program 1: syz_read_part_table(0x8001, 0x0, 0x0) 23:35:30 executing program 4: syz_open_dev$cec(&(0x7f0000000000), 0x2, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 1103.954372] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.954372] [ 1103.964072] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1103.964072] 23:35:30 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0d0000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:30 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000080)={@in6={{0xa, 0x0, 0x0, @private2}}, 0x0, 0x0, 0x0, 0x0, "03c5e23658c475b793f5f8c3147ac82ed7679ea120f0dede4eecb821ec341aae6595164edb327a511bcd3526567c0183f1b56208f18d862b31b503772c26200b6cde3e6990501c081ea6967e91395468"}, 0xd8) 23:35:30 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) ioctl$BTRFS_IOC_START_SYNC(r0, 0x80089418, &(0x7f0000000040)) 23:35:30 executing program 4: syz_open_dev$cec(&(0x7f0000000000), 0x2, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) [ 1104.087684] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.087684] [ 1104.118352] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.118352] 23:35:30 executing program 0: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000380), 0x2, 0x0) write$RDMA_USER_CM_CMD_DISCONNECT(r0, &(0x7f00000003c0)={0xa, 0x4}, 0xc) 23:35:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000011001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1104.221027] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.221027] 23:35:30 executing program 1: r0 = openat$dlm_control(0xffffffffffffff9c, 0x0, 0x410000, 0x0) r1 = syz_mount_image$qnx4(&(0x7f00000000c0), &(0x7f0000000100)='./file0\x00', 0x3ff, 0x1, &(0x7f0000000240)=[{&(0x7f0000000140)="9f22da348f0146851b855ae905fd1e6d959771c404daf2ef73ab5921baaf13309e8680e30d5ed88ceb638d7b65e07d82299d11873115d24305b29c8eb4dbb1837476c89fdf95587c8edb25c22714b3551768319b7a3404367ff98717f56cacd1d1baa28d0d983eaa3e6951a33bbdb3b32ad5bef95d01a6be42df4af79104bcd62222096c3345892b7fa426be776dee6bd56b4cad950df6575cff58e0df9a2dfc09d69706c2c3bb65f9402c3a5642ef7ca4818f601017afb441d6bb18005149f2954dc3c708d6a7f3d84e", 0xca, 0xcfd}], 0x49000, &(0x7f0000000280)={[{'['}, {'/dev/dlm-control\x00'}, {'/dev/dlm-control\x00'}, {'!(^/-\\'}, {}], [{@subj_user={'subj_user', 0x3d, '&$'}}, {@euid_eq={'euid', 0x3d, 0xee00}}]}) clock_gettime(0x0, &(0x7f0000000380)) readlinkat(r1, 0x0, &(0x7f0000000480)=""/18, 0x12) fanotify_mark(r0, 0x0, 0x0, r1, 0x0) syz_mount_image$vxfs(&(0x7f00000007c0), &(0x7f0000000800)='./file0/file0\x00', 0x7fff, 0x2, &(0x7f0000000a40)=[{&(0x7f0000000840)}, {0x0}], 0x0, &(0x7f0000000ac0)) openat$nvme_fabrics(0xffffffffffffff9c, &(0x7f0000000b40), 0x30080, 0x0) 23:35:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090900000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:30 executing program 4: syz_open_dev$cec(&(0x7f0000000000), 0x2, 0x2) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r0, 0x0) preadv(r0, &(0x7f0000000280), 0x100000000000008d, 0x4, 0x0) r1 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r2 = ioctl$KVM_CREATE_VM(r1, 0xae01, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') r4 = ioctl$KVM_CREATE_VCPU(r2, 0xae41, 0x0) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f0000000040)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) 23:35:30 executing program 0: r0 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) ioctl$vim2m_VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000040)={0x1, @vbi={0x80000008, 0x400}}) [ 1104.334478] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.334478] [ 1104.349493] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.349493] 23:35:30 executing program 1: openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000200), 0x4002, 0x0) 23:35:30 executing program 0: pselect6(0x40, &(0x7f00000004c0), &(0x7f0000000500), 0x0, &(0x7f0000000580), 0x0) [ 1104.448105] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.448105] [ 1104.474356] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.474356] 23:35:30 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0e0000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000012001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:30 executing program 4: r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$SCSI_IOCTL_SEND_COMMAND(r0, 0x1, &(0x7f0000001a80)={0x2e0, 0x0, 0x0, "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"}) 23:35:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$L2TP_CMD_TUNNEL_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) 23:35:30 executing program 4: syz_mount_image$qnx4(0x0, 0x0, 0x0, 0x1, &(0x7f0000001a00)=[{&(0x7f0000000800)="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", 0x801}], 0x0, 0x0) 23:35:30 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:35:30 executing program 0: syz_mount_image$qnx4(0x0, 0x0, 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f0000000200)='\v', 0x1}], 0x0, 0x0) [ 1104.664880] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.664880] [ 1104.665092] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.665092] [ 1104.691359] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.691359] 23:35:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090b00000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000013001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:31 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x3, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @empty}}}, 0x108) 23:35:31 executing program 0: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_timeval(r0, 0x1, 0x14, 0x0, &(0x7f0000001280)) 23:35:31 executing program 1: ioctl$sock_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000280)={0x0, @generic={0x0, "c8a4dc7893dc0abcae49b7157bba"}, @can, @ax25={0x3, @null}}) mlock2(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0) [ 1104.889722] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.889722] 23:35:31 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0f0000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000005880)=[{{&(0x7f0000000380)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c, 0x0, 0x0, &(0x7f00000005c0)=[@hopopts_2292={{0x18}}, @hoplimit_2292={{0x14}}], 0x30}}], 0x1, 0x20004840) 23:35:31 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x13c}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x2, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:35:31 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x3, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 1104.942175] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1104.942175] 23:35:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc9, 0xc9, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0xe8}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 1105.025039] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1105.025039] [ 1105.047980] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1105.047980] 23:35:31 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x3, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:35:31 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x154}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:35:31 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090f00000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) [ 1105.182303] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1105.182303] [ 1105.197659] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1105.197659] 23:35:31 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000001f001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003", 0x13, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:31 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x154}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:35:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc9, 0xc9, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0xe8}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:35:31 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x3, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) [ 1105.357683] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1105.357683] [ 1105.402805] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1105.402805] 23:35:31 executing program 5: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f100000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080", 0x36, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:31 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x11d, 0x11d, 0x3, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0]}}, 0x0, 0x13b}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) 23:35:31 executing program 3: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000091000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000000000", 0x20, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}], 0x0, &(0x7f0000000040)) 23:35:31 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x154}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:35:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc9, 0xc9, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0xe8}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) r3 = gettid() rt_sigqueueinfo(r3, 0x3c, &(0x7f0000000040)) 23:35:31 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x135, 0x135, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @union={0x0, 0x6, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}, {}]}, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @array, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0x154}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) 23:35:31 executing program 0: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x2800004, 0x12, r1, 0x0) preadv(r0, &(0x7f0000000280)=[{0x0}], 0x1, 0x0, 0x0) mmap(&(0x7f0000000000/0xfbe000)=nil, 0xfbe000, 0x7, 0x31, 0xffffffffffffffff, 0x0) prctl$PR_SET_PTRACER(0x59616d61, 0xffffffffffffffff) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r2 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r2, 0x0, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc9, 0xc9, 0x4, [@datasec={0x0, 0x1, 0x0, 0xf, 0x1, [{}], "db"}, @union={0x0, 0x2, 0x0, 0x5, 0x0, 0x0, [{}, {}]}, @const, @func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {}, {}]}, @func_proto, @union={0x0, 0x3, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}]}, @restrict, @typedef]}, {0x0, [0x0, 0x0]}}, 0x0, 0xe8}, 0x20) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r2, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) rt_sigqueueinfo(0x0, 0x3c, &(0x7f0000000040)) [ 1105.549670] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1105.549670] [ 1105.625625] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1105.625625] [ 1105.641048] BUG: unable to handle kernel paging request at ffffffffffffff80 [ 1105.648197] PGD 9e6e067 P4D 9e6e067 PUD 9e70067 PMD 0 [ 1105.653501] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1105.658033] CPU: 1 PID: 3169 Comm: syz-executor.5 Not tainted 4.19.190-syzkaller #0 [ 1105.665833] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1105.675760] RIP: 0010:diFree+0x141/0x29c0 [ 1105.679928] Code: 28 48 8d 78 80 48 89 44 24 10 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 13 22 00 00 48 8b 44 24 10 <48> 8b 68 80 48 8b 44 24 18 4c 8d 6d 04 48 c1 e8 0c 4c 89 ea 48 c1 [ 1105.699390] RSP: 0018:ffff8880b3e8f930 EFLAGS: 00010246 [ 1105.704761] RAX: 0000000000000000 RBX: ffff8880b4dbacc0 RCX: ffffc90012a75000 [ 1105.712036] RDX: 1ffffffffffffff0 RSI: ffffffff8274aad2 RDI: ffffffffffffff80 [ 1105.719309] RBP: ffff88804273a6e8 R08: 0000000000000000 R09: 0000000000000000 [ 1105.726577] R10: 0000000000000001 R11: 0000000000000000 R12: ffff88804273a6e8 [ 1105.733852] R13: ffff88804273a710 R14: ffffffff889ad780 R15: ffff88804bc1aef8 [ 1105.741150] FS: 00007fd32062b700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 1105.749395] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1105.755307] CR2: ffffffffffffff80 CR3: 0000000046539000 CR4: 00000000001406e0 [ 1105.762616] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1105.769993] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1105.777435] Call Trace: [ 1105.780033] ? mark_held_locks+0xf0/0xf0 [ 1105.784169] ? do_syscall_64+0xf9/0x620 [ 1105.788341] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.793708] ? do_read_cache_page+0xfe/0x1170 [ 1105.798210] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1105.802799] ? __dquot_initialize+0x298/0xb70 [ 1105.807302] ? pagevec_lookup_range_tag+0x3b/0x80 [ 1105.812152] ? __inode_wait_for_writeback+0x184/0x1f0 [ 1105.817367] ? dquot_initialize_needed+0x290/0x290 [ 1105.822312] ? diWrite+0x13c0/0x13c0 [ 1105.826035] ? lock_downgrade+0x720/0x720 [ 1105.830538] jfs_evict_inode+0x126/0x170 [ 1105.834602] ? jfs_write_inode+0x1d0/0x1d0 [ 1105.838870] evict+0x2ed/0x760 [ 1105.842068] iput+0x4f1/0x860 [ 1105.845177] diFreeSpecial+0x63/0x80 [ 1105.849173] jfs_mount+0x23f/0x3d0 [ 1105.852720] jfs_fill_super+0x55c/0xb50 [ 1105.856701] ? parse_options+0xe70/0xe70 [ 1105.860879] ? set_blocksize+0x163/0x3f0 [ 1105.864946] mount_bdev+0x2fc/0x3b0 [ 1105.868578] ? parse_options+0xe70/0xe70 [ 1105.872638] mount_fs+0xa3/0x310 [ 1105.876007] vfs_kern_mount.part.0+0x68/0x470 [ 1105.880507] do_mount+0x113c/0x2f10 [ 1105.884139] ? cmp_ex_sort+0xc0/0xc0 [ 1105.887857] ? __do_page_fault+0x180/0xd60 [ 1105.892097] ? copy_mount_string+0x40/0x40 [ 1105.896346] ? memset+0x20/0x40 [ 1105.899628] ? copy_mount_options+0x26f/0x380 [ 1105.904131] ksys_mount+0xcf/0x130 [ 1105.907674] __x64_sys_mount+0xba/0x150 [ 1105.911653] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1105.916234] do_syscall_64+0xf9/0x620 [ 1105.920044] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1105.925233] RIP: 0033:0x467afa [ 1105.928426] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1105.947765] RSP: 002b:00007fd32062afa8 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 1105.955569] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1105.962846] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007fd32062b000 [ 1105.970122] RBP: 00007fd32062b040 R08: 00007fd32062b040 R09: 0000000020000000 [ 1105.977400] R10: 0000000000000000 R11: 0000000000000206 R12: 0000000020000000 [ 1105.984673] R13: 0000000020000100 R14: 00007fd32062b000 R15: 0000000020000040 [ 1105.991958] Modules linked in: [ 1105.995156] CR2: ffffffffffffff80 [ 1105.998610] ---[ end trace 5e3645695d14237f ]--- [ 1106.003638] RIP: 0010:diFree+0x141/0x29c0 [ 1106.007890] Code: 28 48 8d 78 80 48 89 44 24 10 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 13 22 00 00 48 8b 44 24 10 <48> 8b 68 80 48 8b 44 24 18 4c 8d 6d 04 48 c1 e8 0c 4c 89 ea 48 c1 [ 1106.026799] RSP: 0018:ffff8880b3e8f930 EFLAGS: 00010246 [ 1106.032163] RAX: 0000000000000000 RBX: ffff8880b4dbacc0 RCX: ffffc90012a75000 [ 1106.039433] RDX: 1ffffffffffffff0 RSI: ffffffff8274aad2 RDI: ffffffffffffff80 [ 1106.046718] RBP: ffff88804273a6e8 R08: 0000000000000000 R09: 0000000000000000 [ 1106.054078] R10: 0000000000000001 R11: 0000000000000000 R12: ffff88804273a6e8 [ 1106.061347] R13: ffff88804273a710 R14: ffffffff889ad780 R15: ffff88804bc1aef8 [ 1106.068634] FS: 00007fd32062b700(0000) GS:ffff8880ba100000(0000) knlGS:0000000000000000 [ 1106.076880] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1106.082761] CR2: ffffffffffffff80 CR3: 0000000046539000 CR4: 00000000001406e0 [ 1106.090036] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1106.097305] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1106.104591] Kernel panic - not syncing: Fatal exception [ 1106.110461] Kernel Offset: disabled [ 1106.114095] Rebooting in 86400 seconds..