, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) [ 1660.739590][T20888] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1660.739590][T20888] [ 1660.740079][T20892] Mount JFS Failure: -5 [ 1660.740093][T20892] jfs_mount failed w/return code = -5 20:02:32 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000", 0x7e, 0xb600}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1660.823239][T20911] loop0: detected capacity change from 0 to 61456 [ 1660.825860][T20888] ERROR: (device loop2): remounting filesystem as read-only [ 1660.867284][T20913] __nla_validate_parse: 7 callbacks suppressed [ 1660.867303][T20913] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1660.885712][T20888] xtLookup: xtSearch returned -5 [ 1660.893526][T20911] jfs_mount: dbMount failed w/rc = -5 [ 1660.900352][T20888] read_mapping_page failed! [ 1660.919704][T20888] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1660.920219][T20911] Mount JFS Failure: -5 [ 1660.949696][T20888] Mount JFS Failure: -5 [ 1660.962570][T20911] jfs_mount failed w/return code = -5 [ 1660.972854][T20888] jfs_mount failed w/return code = -5 20:02:33 executing program 3: socketpair$tipc(0x1e, 0x5, 0x0, &(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$sock_attach_bpf(r0, 0x1, 0x32, 0x0, 0x0) 20:02:33 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@array={0x0, 0x0, 0x0, 0x3, 0x74000000}]}}, &(0x7f0000000200)=""/133, 0x32, 0x85, 0x1}, 0x20) 20:02:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x6c}}}, 0xb8}}, 0x0) 20:02:33 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000", 0x1c, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:33 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f00", 0x3d, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1661.138646][T20918] loop1: detected capacity change from 0 to 61456 [ 1661.292482][T20930] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:33 executing program 3: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x81, 0x2, 0x49, 0x0, 0x100, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, @perf_config_ext={0x62b, 0xbc}, 0x0, 0x3, 0x6, 0xd107ca68c1bb2463, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x40000000000001b}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0xf7043e9858641a84, &(0x7f0000000140)="b9ff0300600d698cff9e142808004de7f9c764362ae28eff07002000000003a08b7989080594e5d04e0d44180521b474b67b2b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0xf0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) [ 1661.335475][T20933] loop0: detected capacity change from 0 to 61456 20:02:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) perf_event_open(&(0x7f0000000280)={0x4, 0x80, 0x0, 0x81, 0x2, 0x49, 0x0, 0x100, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x3, @perf_config_ext={0x62b}, 0xa014, 0x0, 0x6, 0xd107ca68c1bb2463, 0x6, 0x6, 0x0, 0x0, 0x0, 0x0, 0x40000000000001b}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x42, 0xf7043e9858641a84, &(0x7f0000000140)="b9ff0300600d698cff9e142808004de7f9c764362ae28eff07002000000003a08b7989080594e5d04e0d441805f0b474b67b2b4b777b5c15d51e3e7b1263afc0bac3", 0x0, 0xf0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x40) 20:02:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x74}}}, 0xb8}}, 0x0) [ 1661.426508][T20933] jfs_mount: dbMount failed w/rc = -5 [ 1661.466542][T20933] Mount JFS Failure: -5 [ 1661.494490][T20933] jfs_mount failed w/return code = -5 [ 1661.543320][T20918] jfs_mount: diMount(ipaimap2) failed, rc = -5 20:02:33 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f000000", 0x47, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1661.595697][T20918] Mount JFS Failure: -5 [ 1661.604640][T20937] loop2: detected capacity change from 0 to 178 [ 1661.612589][T20918] jfs_mount failed w/return code = -5 20:02:33 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1661.704350][T20946] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:33 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$TUNSETIFINDEX(r0, 0x40049409, 0x0) 20:02:33 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e142808004de7f9c764362ae28eff0700e000000003a08b79", 0x0, 0xf0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) 20:02:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x7a}}}, 0xb8}}, 0x0) [ 1661.940743][T20937] jfs_mount: dbMount failed w/rc = -5 [ 1661.942432][T20954] loop0: detected capacity change from 0 to 61456 [ 1662.026272][T20937] Mount JFS Failure: -5 [ 1662.053630][T20937] jfs_mount failed w/return code = -5 [ 1662.158408][T20961] loop1: detected capacity change from 0 to 61456 [ 1662.213690][T20964] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:34 executing program 3: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000003840)={&(0x7f00000036c0)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x7, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{0x4, 0x7fff}]}, @array={0x0, 0x0, 0x0, 0x3, 0x0, {0x2, 0x1}}]}, {0x0, [0x0, 0x0, 0x0, 0x61, 0x5f]}}, &(0x7f0000003740)=""/213, 0x4b, 0xd5, 0x1}, 0x20) 20:02:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xf0}}}, 0xb8}}, 0x0) [ 1662.291712][T20954] jfs_mount: dbMount failed w/rc = -5 20:02:34 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000", 0x18, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:34 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c43, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = bpf$PROG_LOAD(0x5, &(0x7f0000000200)={0xc, 0xe, &(0x7f0000001500)=ANY=[@ANYBLOB="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"], &(0x7f0000000340)='syzkaller\x00'}, 0x48) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000040)={r0, 0x18000000000002a0, 0x22, 0x0, &(0x7f0000000140)="b9ff0300600d698cff9e142808004de7f9c764362ae28eff0700e000000003a08b79", 0x0, 0xf0, 0x60000000, 0x0, 0x0, 0x0, 0x0}, 0x48) [ 1662.337207][T20954] Mount JFS Failure: -5 [ 1662.381733][T20954] jfs_mount failed w/return code = -5 20:02:34 executing program 3: perf_event_open(&(0x7f0000003a00)={0x6, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 20:02:34 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f000000", 0x47, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1662.546276][T20961] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1662.576717][T20978] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1662.587673][T20961] Mount JFS Failure: -5 20:02:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x300}}}, 0xb8}}, 0x0) [ 1662.593925][T20961] jfs_mount failed w/return code = -5 20:02:34 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$inet(r0, &(0x7f0000000340)={0x0, 0x0, 0x0}, 0x0) 20:02:34 executing program 3: perf_event_open(&(0x7f0000003a00)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 1662.846407][T20989] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1662.850399][T20981] loop2: detected capacity change from 0 to 178 20:02:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x500}}}, 0xb8}}, 0x0) [ 1663.001220][T20988] loop0: detected capacity change from 0 to 61456 20:02:35 executing program 4: r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000040), 0x0) r1 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) r2 = bpf$BPF_LINK_CREATE(0x1c, &(0x7f0000000300)={0xffffffffffffffff, r0, 0x10}, 0x10) bpf$ITER_CREATE(0x21, &(0x7f0000000340)={r2}, 0x8) socket$kcm(0xa, 0x6, 0x0) setsockopt$sock_attach_bpf(0xffffffffffffffff, 0x10d, 0x2, &(0x7f0000000040), 0x17) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = gettid() getpid() r4 = getpid() perf_event_open(&(0x7f000025c000)={0x400000001, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r4, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, r3, 0x1, 0xffffffffffffffff, 0x0) write$cgroup_int(r0, &(0x7f0000000200), 0x12) write$cgroup_int(r1, &(0x7f0000000080)=0x3, 0x12) ioctl$PERF_EVENT_IOC_PERIOD(r1, 0x40305839, &(0x7f0000000040)) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000600)={&(0x7f0000000180), 0x6e, &(0x7f00000002c0)=[{0x0}, {&(0x7f00000004c0)=""/134, 0x86}], 0x2, &(0x7f0000000580)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}, 0x63) openat$cgroup_ro(r5, &(0x7f0000000100)='blkio.throttle.io_serviced\x00', 0x0, 0x0) [ 1663.123619][T20981] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1663.132167][T20981] Mount JFS Failure: -5 [ 1663.150545][T20981] jfs_mount failed w/return code = -5 20:02:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001840)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={0x0, r1, 0x1, 0x300}}, 0x20) 20:02:35 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000", 0x18, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1663.279550][T20997] loop1: detected capacity change from 0 to 61456 [ 1663.339815][T21007] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x600}}}, 0xb8}}, 0x0) [ 1663.584127][T20988] jfs_mount: dbMount failed w/rc = -5 [ 1663.594101][T20988] Mount JFS Failure: -5 [ 1663.625973][T20988] jfs_mount failed w/return code = -5 [ 1663.661112][T20997] jfs_mount: diMount(ipaimap2) failed, rc = -5 20:02:35 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r1}}, 0x10) 20:02:35 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f000000", 0x47, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1663.686129][T20997] Mount JFS Failure: -5 [ 1663.705329][T20997] jfs_mount failed w/return code = -5 [ 1663.763323][T21016] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:35 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x700}}}, 0xb8}}, 0x0) 20:02:36 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000080)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000000)={0xffffffffffffffff}, 0x13f}}, 0x20) write$RDMA_USER_CM_CMD_NOTIFY(r0, &(0x7f00000000c0)={0xf, 0x8, 0xfa00, {r1}}, 0x10) [ 1664.003818][T21018] loop2: detected capacity change from 0 to 178 [ 1664.290916][T21034] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1664.327119][T21035] loop1: detected capacity change from 0 to 61456 [ 1664.401346][T21030] loop0: detected capacity change from 0 to 61456 20:02:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x732}}}, 0xb8}}, 0x0) 20:02:36 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ff3000/0x1000)=nil, 0x1000, 0x3, 0x13, r0, 0x10000000) [ 1664.445720][T21035] jfs_mount: diMount(ipaimap2) failed, rc = -5 20:02:36 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r0, &(0x7f0000000080)="91", 0x1, 0x8040, 0x0, 0x0) [ 1664.584710][T21035] Mount JFS Failure: -5 [ 1664.609099][T21035] jfs_mount failed w/return code = -5 [ 1664.617952][T21018] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1664.630101][T21018] Mount JFS Failure: -5 20:02:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x900}}}, 0xb8}}, 0x0) [ 1664.653213][T21044] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1664.656410][T21018] jfs_mount failed w/return code = -5 [ 1664.675421][T21030] jfs_mount: dbMount failed w/rc = -5 [ 1664.686046][T21030] Mount JFS Failure: -5 [ 1664.695307][T21030] jfs_mount failed w/return code = -5 20:02:36 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {0x0, 0x0, 0xb600}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:36 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000", 0x18, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:36 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x891a, &(0x7f0000000000)={'geneve1\x00', @ifru_addrs=@tipc}) 20:02:36 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f", 0x4c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xa00}}}, 0xb8}}, 0x0) 20:02:36 executing program 4: r0 = perf_event_open(&(0x7f0000003a00)={0x8, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, r0, 0x0) 20:02:37 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000080), 0x0, 0x109002) pread64(r0, 0x0, 0x0, 0x0) [ 1665.110388][T21064] loop1: detected capacity change from 0 to 61456 20:02:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xe00}}}, 0xb8}}, 0x0) 20:02:37 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$netlink(r0, &(0x7f0000003700)={0x0, 0x0, &(0x7f0000003680)=[{&(0x7f00000000c0)={0x10}, 0x10}, {&(0x7f0000002e40)={0x10, 0x1e, 0x1}, 0x10}], 0x2}, 0x0) [ 1665.247613][T21063] loop2: detected capacity change from 0 to 178 [ 1665.266812][T21070] loop0: detected capacity change from 0 to 61456 [ 1665.423875][T21070] jfs_mount: dbMount failed w/rc = -5 [ 1665.488230][T21070] Mount JFS Failure: -5 [ 1665.542361][T21070] jfs_mount failed w/return code = -5 20:02:37 executing program 3: r0 = openat$qrtrtun(0xffffffffffffff9c, &(0x7f0000000000), 0x0) pread64(r0, 0x0, 0x0, 0x0) 20:02:37 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f", 0x4c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xf00}}}, 0xb8}}, 0x0) [ 1665.756115][T21064] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1665.778686][T21064] Mount JFS Failure: -5 [ 1665.791670][T21064] jfs_mount failed w/return code = -5 20:02:37 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1665.897510][T21063] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1665.935551][T21063] Mount JFS Failure: -5 [ 1665.938487][T21090] __nla_validate_parse: 3 callbacks suppressed 20:02:38 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:38 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8931, &(0x7f00000001c0)={'veth1_to_bridge\x00', @ifru_mtu}) [ 1665.938505][T21090] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1665.980940][T21063] jfs_mount failed w/return code = -5 20:02:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x1036}}}, 0xb8}}, 0x0) [ 1666.069315][T21093] loop0: detected capacity change from 0 to 61456 20:02:38 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000080)="91", 0x1, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000000400)=[{{0x0, 0x0, &(0x7f0000000380)=[{&(0x7f00000001c0)=""/170, 0xaa}], 0x1}}], 0x1, 0x0, 0x0) [ 1666.109681][T21093] jfs_mount: dbMount failed w/rc = -5 [ 1666.137078][T21093] Mount JFS Failure: -5 [ 1666.148017][T21093] jfs_mount failed w/return code = -5 20:02:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x1f00}}}, 0xb8}}, 0x0) [ 1666.157573][T21101] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:38 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f", 0x4c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1666.284890][T21102] loop1: detected capacity change from 0 to 61456 20:02:38 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000080), 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) [ 1666.548682][T21106] loop2: detected capacity change from 0 to 178 [ 1666.621481][T21117] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x2000}}}, 0xb8}}, 0x0) [ 1666.719440][T21118] loop0: detected capacity change from 0 to 61456 20:02:38 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40187014, &(0x7f0000000040)) [ 1666.842272][T21118] jfs_mount: dbMount failed w/rc = -5 [ 1666.886886][T21118] Mount JFS Failure: -5 20:02:38 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000180)={0xe, 0x18, 0xfa00, @id_resuseaddr={0x0, r1}}, 0x20) [ 1666.922930][T21106] jfs_mount: dbMount failed w/rc = -5 [ 1666.929211][T21118] jfs_mount failed w/return code = -5 [ 1666.937997][T21102] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1666.947711][T21106] Mount JFS Failure: -5 [ 1666.964859][T21106] jfs_mount failed w/return code = -5 [ 1666.980647][T21102] Mount JFS Failure: -5 [ 1667.000174][T21102] jfs_mount failed w/return code = -5 20:02:39 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000", 0x4e, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1667.025827][T21127] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:39 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:39 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000", 0x18, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x3207}}}, 0xb8}}, 0x0) 20:02:39 executing program 4: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8934, &(0x7f0000000000)={'geneve1\x00', @ifru_addrs=@tipc}) 20:02:39 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000200)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x8001}, r1}}, 0x30) 20:02:39 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000000240)={0x3, 0x3, &(0x7f0000000040)=@framed, &(0x7f00000000c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 1667.278632][T21142] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x3610}}}, 0xb8}}, 0x0) [ 1667.395202][T21143] loop1: detected capacity change from 0 to 61456 [ 1667.423637][T21151] loop0: detected capacity change from 0 to 61456 [ 1667.492928][T21143] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1667.492928][T21143] [ 1667.585005][T21151] jfs_mount: dbMount failed w/rc = -5 [ 1667.673918][T21151] Mount JFS Failure: -5 [ 1667.676593][T21143] ERROR: (device loop1): remounting filesystem as read-only [ 1667.696388][T21159] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:39 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x40, 0x0, 0x0) 20:02:39 executing program 3: r0 = syz_io_uring_setup(0x6781, &(0x7f0000000040), &(0x7f0000a8f000/0x4000)=nil, &(0x7f0000000000/0xa000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) r1 = socket$l2tp(0x2, 0x2, 0x73) r2 = socket$unix(0x1, 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[r1, r2, 0xffffffffffffffff, r0], 0x4) [ 1667.731331][T21151] jfs_mount failed w/return code = -5 20:02:39 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000", 0x4e, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1667.773146][T21154] loop2: detected capacity change from 0 to 178 [ 1667.787647][T21143] xtLookup: xtSearch returned -5 20:02:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x4800}}}, 0xb8}}, 0x0) [ 1667.851098][T21143] read_mapping_page failed! [ 1667.879049][T21143] jfs_mount: dbMount failed w/rc = -5 [ 1667.923128][T21143] Mount JFS Failure: -5 [ 1667.967198][T21143] jfs_mount failed w/return code = -5 20:02:40 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1668.122001][T21171] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:40 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000080), 0x0, 0x1) read$qrtrtun(r0, 0x0, 0x0) [ 1668.291695][ T1235] ieee802154 phy0 wpan0: encryption failed: -22 [ 1668.298049][ T1235] ieee802154 phy1 wpan1: encryption failed: -22 [ 1668.322650][T21154] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1668.328889][T21154] Mount JFS Failure: -5 [ 1668.348624][T21154] jfs_mount failed w/return code = -5 20:02:40 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000", 0x18, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:40 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x4024700a, 0x0) 20:02:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x4c00}}}, 0xb8}}, 0x0) [ 1668.408489][T21174] loop0: detected capacity change from 0 to 61456 20:02:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000080)="91", 0x1, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000001dc0)={0x0, 0x0}) recvmmsg$unix(r0, &(0x7f0000001d40)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, 0x0, 0x18}}], 0x2, 0x0, &(0x7f0000001e00)={0x0, r2+60000000}) 20:02:40 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000ec0)={0x0, 0x0, &(0x7f0000006d00)=[{&(0x7f0000001100)={0x24, 0x11, 0x1, 0x0, 0x0, "", [@typed={0x4}, @generic="3afd0d3ce5bedc44d87149099a"]}, 0x24}], 0x1}, 0x0) [ 1668.591096][T21189] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1668.666151][T21182] loop1: detected capacity change from 0 to 61456 20:02:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x6000}}}, 0xb8}}, 0x0) 20:02:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0xc0045878, 0x0) [ 1668.904509][T21174] jfs_mount: dbMount failed w/rc = -5 [ 1668.952874][T21174] Mount JFS Failure: -5 [ 1669.001139][T21174] jfs_mount failed w/return code = -5 [ 1669.033988][T21199] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1669.050982][T21194] loop2: detected capacity change from 0 to 178 [ 1669.090341][T21201] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:41 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f", 0x4c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1669.141587][T21182] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1669.141587][T21182] 20:02:41 executing program 3: r0 = socket(0x18, 0x0, 0x0) syz_genetlink_get_family_id$l2tp(&(0x7f0000000040), r0) 20:02:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x6800}}}, 0xb8}}, 0x0) [ 1669.350103][T21182] ERROR: (device loop1): remounting filesystem as read-only [ 1669.446797][T21182] xtLookup: xtSearch returned -5 [ 1669.486222][T21194] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1669.494226][T21182] read_mapping_page failed! [ 1669.494251][T21182] jfs_mount: dbMount failed w/rc = -5 [ 1669.494458][T21182] Mount JFS Failure: -5 [ 1669.494470][T21182] jfs_mount failed w/return code = -5 20:02:41 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:41 executing program 4: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8914, &(0x7f0000000000)={'geneve1\x00', @ifru_addrs=@tipc}) [ 1669.583668][T21194] Mount JFS Failure: -5 [ 1669.605625][T21194] jfs_mount failed w/return code = -5 20:02:41 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000", 0x18, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:41 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8970, &(0x7f0000000040)={'syz_tun\x00', @ifru_settings={0x0, 0x0, @sync=0x0}}) 20:02:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x6c00}}}, 0xb8}}, 0x0) 20:02:41 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @id_resuseaddr={&(0x7f0000000080)=0x1, r1, 0x0, 0x1, 0x4}}, 0x20) [ 1669.728207][T21208] loop0: detected capacity change from 0 to 61456 20:02:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x7400}}}, 0xb8}}, 0x0) 20:02:41 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001840)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000000c0)=[{0x2b}], r1, 0x1, 0x1, 0x48}}, 0x20) 20:02:42 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001840)={0xffffffffffffffff}, 0x106}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) [ 1670.147526][T21227] loop1: detected capacity change from 0 to 61456 [ 1670.254769][T21233] loop2: detected capacity change from 0 to 178 [ 1670.376479][T21208] jfs_mount: dbMount failed w/rc = -5 [ 1670.428616][T21208] Mount JFS Failure: -5 [ 1670.488587][T21208] jfs_mount failed w/return code = -5 20:02:42 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f", 0x4c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x7a00}}}, 0xb8}}, 0x0) 20:02:42 executing program 3: r0 = open(&(0x7f0000000080)='./bus\x00', 0x141042, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r1 = getpid() sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r1, &(0x7f0000000240)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$unix(r3, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r2, &(0x7f00000000c0), 0x10106, 0x0, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, 0x0, &(0x7f0000002340)) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000007280)={0x0, 0x0, 0x0, 0x0, &(0x7f0000007180)=ANY=[@ANYBLOB="05e12a2d84ff7517", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c", @ANYRES32=0x0, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0], 0xe0, 0x88}, 0x2004c099) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r4 = open(&(0x7f0000000100)='./bus\x00', 0x6e842, 0x0) pwritev2(r4, &(0x7f0000000240)=[{&(0x7f0000000000)="85", 0x300000}], 0x1, 0x4200, 0x0, 0x3) [ 1670.607171][T21233] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1670.627600][T21233] Mount JFS Failure: -5 [ 1670.650290][T21233] jfs_mount failed w/return code = -5 [ 1670.703924][T21227] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1670.703924][T21227] [ 1670.750857][T21227] ERROR: (device loop1): remounting filesystem as read-only [ 1670.759307][T21227] xtLookup: xtSearch returned -5 [ 1670.774005][T21227] read_mapping_page failed! [ 1670.778901][T21227] jfs_mount: dbMount failed w/rc = -5 [ 1670.827254][T21254] loop0: detected capacity change from 0 to 61456 [ 1670.861470][T21227] Mount JFS Failure: -5 [ 1670.874970][T21254] jfs_mount: dbMount failed w/rc = -5 [ 1670.875029][T21227] jfs_mount failed w/return code = -5 [ 1670.888674][T21254] Mount JFS Failure: -5 [ 1670.899197][T21254] jfs_mount failed w/return code = -5 20:02:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xf000}}}, 0xb8}}, 0x0) 20:02:43 executing program 4: r0 = socket(0x11, 0x2, 0x0) recvmsg$can_j1939(r0, &(0x7f0000000300)={0x0, 0x0, 0x0}, 0x41) 20:02:43 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000", 0x19, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:43 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f", 0x4c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:43 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {0x0, 0x0, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1671.364866][T21268] loop0: detected capacity change from 0 to 61456 20:02:43 executing program 4: r0 = socket(0x22, 0x2, 0x2) sendmsg$L2TP_CMD_TUNNEL_MODIFY(r0, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000400)={0x14}, 0x14}}, 0x0) 20:02:43 executing program 3: r0 = socket(0x2, 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs={0x0, 0x0, 0x4e22}, 0x6e) [ 1671.613588][T21268] jfs_mount: dbMount failed w/rc = -5 [ 1671.660402][T21268] Mount JFS Failure: -5 20:02:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x34000}}}, 0xb8}}, 0x0) [ 1671.697508][T21269] loop2: detected capacity change from 0 to 178 [ 1671.701229][T21268] jfs_mount failed w/return code = -5 [ 1671.807301][T21278] loop1: detected capacity change from 0 to 61456 20:02:44 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f00", 0x4d, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:44 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_READ_VERITY_METADATA(r0, 0xc0286687, 0x0) 20:02:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) [ 1672.117400][T21290] __nla_validate_parse: 4 callbacks suppressed [ 1672.117421][T21290] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1672.147827][T21269] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1672.207112][T21269] Mount JFS Failure: -5 20:02:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x400300}}}, 0xb8}}, 0x0) [ 1672.249091][T21269] jfs_mount failed w/return code = -5 20:02:44 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000", 0x19, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1672.317336][T21278] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1672.317336][T21278] 20:02:44 executing program 3: r0 = socket(0x22, 0x2, 0x10) recvmmsg$unix(r0, &(0x7f0000003040)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x118}}], 0x1, 0x10060, 0x0) [ 1672.364529][T21294] loop0: detected capacity change from 0 to 61456 [ 1672.373081][T21278] ERROR: (device loop1): remounting filesystem as read-only [ 1672.396167][T21278] xtLookup: xtSearch returned -5 20:02:44 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000040)={0x0, 0x6}, 0x8) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) [ 1672.431309][T21278] read_mapping_page failed! [ 1672.450330][T21278] jfs_mount: dbMount failed w/rc = -5 [ 1672.458301][T21294] jfs_mount: dbMount failed w/rc = -5 [ 1672.473256][T21303] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1672.480101][T21278] Mount JFS Failure: -5 [ 1672.491129][T21294] Mount JFS Failure: -5 [ 1672.496109][T21278] jfs_mount failed w/return code = -5 20:02:44 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {0x0, 0x0, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1672.569158][T21294] jfs_mount failed w/return code = -5 [ 1672.595133][T21303] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:44 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f00", 0x4d, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xe0ffff}}}, 0xb8}}, 0x0) [ 1672.722201][T21306] loop2: detected capacity change from 0 to 178 [ 1672.783891][T21305] delete_channel: no stack [ 1672.795885][T21305] delete_channel: no stack [ 1672.867105][T21314] loop1: detected capacity change from 0 to 61456 20:02:44 executing program 3: socket$unix(0x1, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) getpeername$unix(0xffffffffffffffff, &(0x7f00000003c0)=@abs, 0x0) bind$unix(r0, &(0x7f0000000200)=@file={0x1, './file0\x00'}, 0x6e) socket$unix(0x1, 0x0, 0x0) sendmsg$unix(0xffffffffffffffff, 0x0, 0x0) [ 1673.029772][T21314] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1673.029772][T21314] [ 1673.048353][T21322] loop0: detected capacity change from 0 to 61456 [ 1673.093889][T21325] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1673.130186][T21314] ERROR: (device loop1): remounting filesystem as read-only [ 1673.168071][T21322] jfs_mount: dbMount failed w/rc = -5 [ 1673.187173][T21314] xtLookup: xtSearch returned -5 20:02:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xf0ffff}}}, 0xb8}}, 0x0) [ 1673.216779][T21322] Mount JFS Failure: -5 [ 1673.237184][T21314] read_mapping_page failed! [ 1673.255419][T21322] jfs_mount failed w/return code = -5 [ 1673.260185][T21306] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1673.273309][T21314] jfs_mount: dbMount failed w/rc = -5 [ 1673.286500][T21306] Mount JFS Failure: -5 20:02:45 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f00", 0x4d, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:45 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000", 0x19, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1673.312390][T21314] Mount JFS Failure: -5 [ 1673.315637][T21306] jfs_mount failed w/return code = -5 [ 1673.348338][T21314] jfs_mount failed w/return code = -5 20:02:45 executing program 3: r0 = socket(0x11, 0x2, 0x0) recvmmsg$unix(r0, &(0x7f00000017c0)=[{{0x0, 0x0, &(0x7f0000000880)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0xfffffffffffffffe}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x1, 0x0, 0x0) [ 1673.423094][T21332] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x1000000}}}, 0xb8}}, 0x0) 20:02:45 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {0x0, 0x0, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:45 executing program 4: r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f0000000040)=@abs={0x1}, 0x6e) [ 1673.616230][T21345] loop2: detected capacity change from 0 to 178 20:02:45 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x5450, 0x0) [ 1673.734054][T21352] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1673.757747][T21353] loop1: detected capacity change from 0 to 61456 [ 1673.768148][T21345] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1673.786692][T21344] loop0: detected capacity change from 0 to 61456 [ 1673.809810][T21345] Mount JFS Failure: -5 [ 1673.865188][T21345] jfs_mount failed w/return code = -5 20:02:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x2000000}}}, 0xb8}}, 0x0) [ 1673.925359][T21353] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1673.925359][T21353] 20:02:46 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1673.995415][T21353] ERROR: (device loop1): remounting filesystem as read-only 20:02:46 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x80045300, &(0x7f0000000080)) [ 1674.062973][T21353] xtLookup: xtSearch returned -5 20:02:46 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f00000000c0), 0x0, 0x40000) mmap$IORING_OFF_SQES(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x10000000) [ 1674.088737][T21353] read_mapping_page failed! [ 1674.122859][T21353] jfs_mount: dbMount failed w/rc = -5 [ 1674.157584][T21353] Mount JFS Failure: -5 [ 1674.170468][T21344] jfs_mount: dbMount failed w/rc = -5 [ 1674.182627][T21353] jfs_mount failed w/return code = -5 [ 1674.193409][T21344] Mount JFS Failure: -5 [ 1674.198431][T21344] jfs_mount failed w/return code = -5 [ 1674.210371][T21368] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:46 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200), 0x0, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:46 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f", 0x4c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x3000000}}}, 0xb8}}, 0x0) 20:02:46 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40a85323, &(0x7f0000000080)) 20:02:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendto$unix(r1, &(0x7f0000000080)="91", 0x1, 0x0, 0x0, 0x0) recvmmsg$unix(r0, &(0x7f0000000480)=[{{&(0x7f0000000140)=@abs, 0x6e, 0x0}}], 0x1, 0x0, &(0x7f00000006c0)={0x77359400}) [ 1674.447517][T21370] loop2: detected capacity change from 0 to 178 [ 1674.595446][T21382] loop1: detected capacity change from 0 to 61456 20:02:46 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc0bc5310, &(0x7f0000000100)={0x10000}) [ 1674.693478][T21391] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:46 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) recvmmsg(r0, &(0x7f0000005740)=[{{0x0, 0x0, 0x0}}], 0x1, 0x10172, 0x0) [ 1674.764453][T21382] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1674.764453][T21382] [ 1674.792235][T21370] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1674.804900][T21370] Mount JFS Failure: -5 20:02:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x4000000}}}, 0xb8}}, 0x0) [ 1674.822881][T21370] jfs_mount failed w/return code = -5 [ 1674.833810][T21393] loop0: detected capacity change from 0 to 61456 [ 1674.844404][T21382] ERROR: (device loop1): remounting filesystem as read-only [ 1674.892978][T21382] xtLookup: xtSearch returned -5 20:02:46 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:47 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001840)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000580)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000540), r1, 0x0, 0x2, 0x4}}, 0x20) [ 1674.926735][T21382] read_mapping_page failed! [ 1674.938148][T21393] jfs_mount: dbMount failed w/rc = -5 20:02:47 executing program 3: r0 = socket$inet6_sctp(0xa, 0x1, 0x84) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0xf, &(0x7f0000000140)={0x0, @in6={{0xa, 0x0, 0x0, @mcast2}}}, &(0x7f0000000000)=0x98) [ 1674.970149][T21382] jfs_mount: dbMount failed w/rc = -5 [ 1674.984429][T21393] Mount JFS Failure: -5 [ 1674.997695][T21382] Mount JFS Failure: -5 [ 1675.004534][T21393] jfs_mount failed w/return code = -5 [ 1675.018651][T21382] jfs_mount failed w/return code = -5 [ 1675.055399][T21405] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:47 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f", 0x4c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:47 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200), 0x0, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:47 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000001c0)=@setlink={0x20, 0x11, 0x1}, 0x20}}, 0x0) 20:02:47 executing program 4: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8955, 0x0) 20:02:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x5000000}}}, 0xb8}}, 0x0) [ 1675.371065][T21420] loop0: detected capacity change from 0 to 61456 [ 1675.376439][T21414] loop2: detected capacity change from 0 to 178 20:02:47 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000140), 0x2, 0x0) pread64(r0, &(0x7f00000000c0)=""/78, 0x4e, 0x0) 20:02:47 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc05c5340, &(0x7f0000000100)={0x10000}) [ 1675.445632][T21427] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1675.481259][T21420] jfs_mount: dbMount failed w/rc = -5 [ 1675.505980][T21420] Mount JFS Failure: -5 20:02:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x6000000}}}, 0xb8}}, 0x0) [ 1675.565330][T21420] jfs_mount failed w/return code = -5 20:02:47 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f", 0x4c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1675.696722][T21414] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1675.715324][T21428] loop1: detected capacity change from 0 to 61456 [ 1675.723493][T21414] Mount JFS Failure: -5 [ 1675.728291][T21414] jfs_mount failed w/return code = -5 20:02:47 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:47 executing program 3: r0 = socket(0x2, 0x2, 0x0) sendmsg$unix(r0, &(0x7f0000001440)={&(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e, 0x0, 0x0, &(0x7f0000003500)=[@rights={{0x10}}, @cred={{0x1c}}], 0x30}, 0x4000084) 20:02:48 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd600400ffffff89"], 0x0) 20:02:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x7000000}}}, 0xb8}}, 0x0) [ 1676.114281][T21428] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1676.114281][T21428] [ 1676.211251][T21428] ERROR: (device loop1): remounting filesystem as read-only [ 1676.222772][T21443] loop0: detected capacity change from 0 to 61456 [ 1676.240868][T21428] xtLookup: xtSearch returned -5 [ 1676.283234][T21428] read_mapping_page failed! [ 1676.324806][T21428] jfs_mount: dbMount failed w/rc = -5 [ 1676.375687][T21428] Mount JFS Failure: -5 [ 1676.444520][T21428] jfs_mount failed w/return code = -5 [ 1676.463667][T21450] loop2: detected capacity change from 0 to 178 20:02:48 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200), 0x0, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:48 executing program 3: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/net\x00') setns(r0, 0x4000080) 20:02:48 executing program 4: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) read$ptp(r0, &(0x7f0000003b00)=""/48, 0x30) 20:02:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x8000000}}}, 0xb8}}, 0x0) [ 1676.589487][T21443] jfs_mount: dbMount failed w/rc = -5 [ 1676.654751][T21443] Mount JFS Failure: -5 [ 1676.687620][T21443] jfs_mount failed w/return code = -5 [ 1676.705982][T21450] jfs_mount: diMount(ipaimap) failed w/rc = -5 20:02:48 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000080), 0x0, 0x0) fsetxattr$security_evm(r0, &(0x7f0000000300), 0x0, 0x4, 0x0) 20:02:48 executing program 4: syz_emit_ethernet(0xe, &(0x7f0000000040)={@multicast, @empty, @void, {@generic={0x892f}}}, 0x0) 20:02:48 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1676.734689][T21450] Mount JFS Failure: -5 [ 1676.754029][T21450] jfs_mount failed w/return code = -5 20:02:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x9000000}}}, 0xb8}}, 0x0) 20:02:48 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:49 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8917, &(0x7f00000000c0)={'syz_tun\x00', @ifru_data=0x0}) 20:02:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xa000000}}}, 0xb8}}, 0x0) 20:02:49 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000100)={@dev, @local, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x0, @dev, @dev, @broadcast, @broadcast}}}}, 0x0) [ 1677.035244][T21470] loop1: detected capacity change from 0 to 61456 [ 1677.093372][T21472] loop0: detected capacity change from 0 to 61456 [ 1677.232262][T21489] __nla_validate_parse: 4 callbacks suppressed [ 1677.232282][T21489] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1677.259604][T21481] loop2: detected capacity change from 0 to 178 [ 1677.451446][T21470] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1677.451446][T21470] [ 1677.476858][T21472] jfs_mount: dbMount failed w/rc = -5 [ 1677.511574][T21472] Mount JFS Failure: -5 [ 1677.517685][T21472] jfs_mount failed w/return code = -5 [ 1677.534393][T21470] ERROR: (device loop1): remounting filesystem as read-only [ 1677.581811][T21481] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1677.581811][T21481] [ 1677.584346][T21470] xtLookup: xtSearch returned -5 [ 1677.627856][T21470] read_mapping_page failed! [ 1677.637133][T21481] ERROR: (device loop2): remounting filesystem as read-only [ 1677.661026][T21481] xtLookup: xtSearch returned -5 [ 1677.666467][T21481] read_mapping_page failed! [ 1677.671560][T21470] jfs_mount: dbMount failed w/rc = -5 [ 1677.680694][T21470] Mount JFS Failure: -5 [ 1677.685377][T21470] jfs_mount failed w/return code = -5 [ 1677.692407][T21481] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1677.700847][T21481] Mount JFS Failure: -5 [ 1677.705393][T21481] jfs_mount failed w/return code = -5 20:02:49 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200"/32, 0x20, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:49 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f00000065c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, &(0x7f0000006080)=[{&(0x7f0000004f00)=""/245, 0xf5}], 0x1}}], 0x2, 0x40012120, 0x0) sendto$unix(r1, &(0x7f0000000080)="91", 0x1, 0x0, 0x0, 0x0) 20:02:49 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0x40505331, &(0x7f0000000080)) 20:02:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xe000000}}}, 0xb8}}, 0x0) 20:02:49 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4", 0x4a, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:49 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:49 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0x40505330, &(0x7f0000000100)={0x10000}) [ 1677.871690][T21509] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1677.892240][T21508] loop0: detected capacity change from 0 to 61456 [ 1677.915102][T21512] loop1: detected capacity change from 0 to 61456 20:02:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xf000000}}}, 0xb8}}, 0x0) [ 1677.927820][T21508] jfs_mount: dbMount failed w/rc = -5 [ 1677.960845][T21508] Mount JFS Failure: -5 20:02:50 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x40049409, 0x0) [ 1677.984672][T21512] read_mapping_page failed! [ 1677.990680][T21508] jfs_mount failed w/return code = -5 [ 1678.012521][T21512] jfs_mount: dbMount failed w/rc = -5 [ 1678.034514][T21512] Mount JFS Failure: -5 20:02:50 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000180)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffffffffff86dd6004000000007300103628e48dda009c9ffc020000000000000000000000000000fe"], 0x0) [ 1678.083201][T21512] jfs_mount failed w/return code = -5 20:02:50 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4", 0x4a, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1678.125075][T21524] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1678.156260][T21520] loop2: detected capacity change from 0 to 178 20:02:50 executing program 4: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8918, &(0x7f0000000000)={'geneve1\x00', @ifru_addrs=@tipc}) 20:02:50 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200"/32, 0x20, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x1f000000}}}, 0xb8}}, 0x0) [ 1678.202423][T20267] I/O error, dev loop1, sector 61312 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 20:02:50 executing program 3: r0 = socket$l2tp(0x2, 0x2, 0x73) recvmmsg(r0, &(0x7f0000003fc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x1, 0x0) 20:02:50 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@dev, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "8ee3ca", 0x0, 0x6, 0x0, @private2, @local}}}}, 0x0) [ 1678.373024][T21520] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1678.373024][T21520] [ 1678.412684][T21541] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x20000000}}}, 0xb8}}, 0x0) [ 1678.477088][T21520] ERROR: (device loop2): remounting filesystem as read-only [ 1678.533973][T21520] xtLookup: xtSearch returned -5 [ 1678.574365][T21538] loop0: detected capacity change from 0 to 61456 [ 1678.576671][T21520] read_mapping_page failed! [ 1678.596865][T21540] loop1: detected capacity change from 0 to 61456 [ 1678.616192][T21520] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1678.653562][T21538] jfs_mount: dbMount failed w/rc = -5 [ 1678.674625][T21520] Mount JFS Failure: -5 [ 1678.689800][T21552] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1678.704314][T21538] Mount JFS Failure: -5 [ 1678.711939][T21520] jfs_mount failed w/return code = -5 [ 1678.723404][T21538] jfs_mount failed w/return code = -5 [ 1678.749097][T21540] read_mapping_page failed! [ 1678.763752][T21540] jfs_mount: dbMount failed w/rc = -5 [ 1678.787127][T21540] Mount JFS Failure: -5 [ 1678.800069][T21540] jfs_mount failed w/return code = -5 20:02:50 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:50 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x401c5820, 0x0) 20:02:50 executing program 4: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x1, 0x0) pread64(r0, 0x0, 0x9, 0x0) 20:02:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x32070000}}}, 0xb8}}, 0x0) 20:02:50 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4", 0x4a, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:50 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200"/32, 0x20, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:51 executing program 4: mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0xab9608b5660366f4, 0xffffffffffffffff, 0x10000000) [ 1678.907921][T21560] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x36100000}}}, 0xb8}}, 0x0) 20:02:51 executing program 3: r0 = socket(0x18, 0x0, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) 20:02:51 executing program 4: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8955, &(0x7f0000000000)={'geneve1\x00', @ifru_addrs=@tipc}) [ 1679.074064][T21572] loop0: detected capacity change from 0 to 61456 [ 1679.093920][T21574] loop1: detected capacity change from 0 to 61456 [ 1679.172024][T21580] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1679.188696][T21572] jfs_mount: dbMount failed w/rc = -5 [ 1679.197089][T21574] read_mapping_page failed! [ 1679.203216][T21569] loop2: detected capacity change from 0 to 178 [ 1679.221702][T21572] Mount JFS Failure: -5 [ 1679.227334][T21574] jfs_mount: dbMount failed w/rc = -5 [ 1679.249758][T21572] jfs_mount failed w/return code = -5 [ 1679.258152][T21574] Mount JFS Failure: -5 20:02:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x48000000}}}, 0xb8}}, 0x0) 20:02:51 executing program 3: shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x0) pipe2(&(0x7f0000000080), 0x0) [ 1679.288872][T21574] jfs_mount failed w/return code = -5 [ 1679.465186][T21592] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1679.478713][T21569] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1679.478713][T21569] [ 1679.493402][T21569] ERROR: (device loop2): remounting filesystem as read-only [ 1679.504012][T21569] xtLookup: xtSearch returned -5 [ 1679.511078][T21569] read_mapping_page failed! [ 1679.517157][T21569] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1679.555953][T21569] Mount JFS Failure: -5 [ 1679.561638][T21569] jfs_mount failed w/return code = -5 20:02:51 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:51 executing program 4: r0 = socket(0x18, 0x0, 0x0) recvmsg$unix(r0, &(0x7f00000002c0)={0x0, 0x0, 0x0}, 0x0) 20:02:51 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:51 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x22, &(0x7f0000000000)=[@in={0x2, 0x3, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 20:02:51 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010000000", 0x30, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x4c000000}}}, 0xb8}}, 0x0) [ 1679.761797][T21605] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:51 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f0000005780)=[{{&(0x7f00000002c0)=@abs={0x1}, 0x6e, 0x0}}], 0x1, 0x0) 20:02:51 executing program 3: r0 = shmat(0x0, &(0x7f0000fff000/0x1000)=nil, 0x5000) shmdt(r0) socketpair(0x0, 0x0, 0x0, &(0x7f0000001b80)) [ 1679.828938][T21606] loop1: detected capacity change from 0 to 61456 [ 1679.867794][T21604] loop0: detected capacity change from 0 to 61456 20:02:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x60000000}}}, 0xb8}}, 0x0) [ 1679.907686][T21606] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1679.963596][T21606] Mount JFS Failure: -5 [ 1680.012454][T21606] jfs_mount failed w/return code = -5 20:02:52 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010000000", 0x30, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1680.103462][T21613] loop2: detected capacity change from 0 to 178 20:02:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmmsg$unix(r0, 0x0, 0x0, 0x0, &(0x7f00000005c0)) [ 1680.174621][T21625] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x68000000}}}, 0xb8}}, 0x0) [ 1680.360923][T21604] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1680.362870][T21631] loop1: detected capacity change from 0 to 61456 [ 1680.410358][T21604] Mount JFS Failure: -5 [ 1680.441423][T21604] jfs_mount failed w/return code = -5 [ 1680.465935][T21631] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1680.488145][T21613] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1680.488145][T21613] [ 1680.502655][T21631] Mount JFS Failure: -5 [ 1680.519510][T21613] ERROR: (device loop2): remounting filesystem as read-only [ 1680.519547][T21613] xtLookup: xtSearch returned -5 [ 1680.549643][T21631] jfs_mount failed w/return code = -5 [ 1680.567727][T21613] read_mapping_page failed! [ 1680.581734][T21613] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1680.602980][T21613] Mount JFS Failure: -5 [ 1680.607834][T21613] jfs_mount failed w/return code = -5 20:02:52 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:52 executing program 3: socketpair(0xa, 0x1, 0x0, &(0x7f0000001280)) 20:02:52 executing program 4: syz_io_uring_setup(0x6781, &(0x7f0000000040), &(0x7f0000002000/0x4000)=nil, &(0x7f0000000000/0xa000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) 20:02:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x6c000000}}}, 0xb8}}, 0x0) 20:02:52 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:52 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010000000", 0x30, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x74000000}}}, 0xb8}}, 0x0) 20:02:52 executing program 4: r0 = syz_init_net_socket$x25(0x9, 0x5, 0x0) ioctl$sock_ifreq(r0, 0x0, 0x0) 20:02:52 executing program 3: r0 = socket(0x11, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000014c0)={&(0x7f0000000000)=@abs={0x0, 0x0, 0x4}, 0x6e, 0x0}, 0x0) [ 1681.001058][T21652] loop1: detected capacity change from 0 to 61456 [ 1681.021982][T21653] loop0: detected capacity change from 0 to 61456 20:02:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x7a000000}}}, 0xb8}}, 0x0) [ 1681.160206][T21653] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1681.206347][T21656] loop2: detected capacity change from 0 to 178 [ 1681.282229][T21653] Mount JFS Failure: -5 20:02:53 executing program 4: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x890b, &(0x7f0000000000)={'geneve1\x00', @ifru_addrs=@tipc}) [ 1681.319270][T21653] jfs_mount failed w/return code = -5 [ 1681.342404][T21652] jfs_mount: diMount(ipaimap2) failed, rc = -5 20:02:53 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1681.416425][T21652] Mount JFS Failure: -5 [ 1681.451945][T21652] jfs_mount failed w/return code = -5 [ 1681.653833][T21679] loop0: detected capacity change from 0 to 61456 [ 1681.670986][T21656] jfs_mount: dbMount failed w/rc = -5 [ 1681.676049][T21679] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1681.685529][T21679] Mount JFS Failure: -5 [ 1681.688413][T21656] Mount JFS Failure: -5 [ 1681.693490][T21679] jfs_mount failed w/return code = -5 [ 1681.694171][T21656] jfs_mount failed w/return code = -5 20:02:53 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:53 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8915, &(0x7f0000000000)={'geneve1\x00', @ifru_addrs=@tipc}) 20:02:53 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x80ffffff}}}, 0xb8}}, 0x0) 20:02:53 executing program 4: syz_emit_ethernet(0x42, &(0x7f0000000100)={@link_local, @local, @void, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @link_local, @private1, @local, @private1}}}}, 0x0) 20:02:53 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x1e, &(0x7f0000000000)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 20:02:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x9effffff}}}, 0xb8}}, 0x0) [ 1681.887508][T21695] loop1: detected capacity change from 0 to 61456 20:02:54 executing program 3: r0 = socket(0x22, 0x2, 0x10) getpeername$unix(r0, 0x0, 0x0) [ 1681.937760][T21699] loop0: detected capacity change from 0 to 61456 [ 1681.966333][T21695] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1681.998933][T21695] Mount JFS Failure: -5 [ 1682.016643][T21699] jfs_mount: dbMount failed w/rc = -5 [ 1682.062994][T21695] jfs_mount failed w/return code = -5 [ 1682.086186][T21699] Mount JFS Failure: -5 [ 1682.113952][T21699] jfs_mount failed w/return code = -5 20:02:54 executing program 4: r0 = socket(0x11, 0x3, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) dup2(r1, r0) 20:02:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xf0ffffff}}}, 0xb8}}, 0x0) [ 1682.172188][T21706] delete_channel: no stack [ 1682.191157][T21705] loop2: detected capacity change from 0 to 178 [ 1682.204641][T21706] delete_channel: no stack 20:02:54 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001840)={0xffffffffffffffff}, 0x111}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f0000000140)={0xe, 0x18, 0xfa00, @ib_path={&(0x7f00000000c0)=[{}], r1, 0x1, 0x1, 0x400000}}, 0x20) [ 1682.435051][T21721] __nla_validate_parse: 6 callbacks suppressed [ 1682.435071][T21721] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1682.460197][T21705] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1682.460197][T21705] [ 1682.475339][T21705] ERROR: (device loop2): remounting filesystem as read-only [ 1682.486032][T21705] xtLookup: xtSearch returned -5 [ 1682.499433][T21705] read_mapping_page failed! [ 1682.510929][T21705] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1682.531986][T21705] Mount JFS Failure: -5 [ 1682.542521][T21705] jfs_mount failed w/return code = -5 20:02:54 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:54 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:54 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:54 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) r1 = syz_io_uring_setup(0x4272, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000000000), &(0x7f0000000300)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f0000000340)=[r0], 0x1) 20:02:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xffffe000}}}, 0xb8}}, 0x0) 20:02:54 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000040), 0x0, 0xc0440) pread64(r0, 0x0, 0x0, 0x0) [ 1682.671873][T20302] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 20:02:54 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$unix(r0, &(0x7f0000002800)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002740)=[@rights={{0x1c, 0x1, 0x1, [r0, r1, 0xffffffffffffffff]}}], 0x20}, 0x0) [ 1682.839405][T21740] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:54 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x7d, &(0x7f0000000000)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) [ 1682.959113][T21735] loop0: detected capacity change from 0 to 61456 20:02:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xfffff000}}}, 0xb8}}, 0x0) [ 1683.013747][T21737] loop1: detected capacity change from 0 to 61456 [ 1683.135124][T21742] loop2: detected capacity change from 0 to 178 20:02:55 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000004c00)={0xa, 0x1, &(0x7f0000004a00)=@raw=[@exit], &(0x7f0000004a40)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 1683.357754][T21735] jfs_mount: dbMount failed w/rc = -5 20:02:55 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_ifreq(r0, 0x0, 0x0) [ 1683.423250][T21735] Mount JFS Failure: -5 [ 1683.425981][T21737] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1683.446413][T21756] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1683.457057][T21737] Mount JFS Failure: -5 [ 1683.475624][T21737] jfs_mount failed w/return code = -5 [ 1683.480359][T21735] jfs_mount failed w/return code = -5 20:02:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xffffff7f}}}, 0xb8}}, 0x0) 20:02:55 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:55 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:55 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010000000", 0x30, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:55 executing program 4: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/bus/input/devices\x00', 0x0, 0x0) r1 = io_uring_setup(0x4e09, &(0x7f0000000040)) io_uring_register$IORING_REGISTER_FILES(r1, 0x2, &(0x7f00000000c0)=[r0, r0], 0x2) 20:02:55 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000080), 0x0, 0x101002) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000340)={0x0, 0x18, 0xfa00, {0x0, 0x0}}, 0x20) 20:02:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xffffff80}}}, 0xb8}}, 0x0) [ 1683.741672][T21742] jfs_mount: dbMount failed w/rc = -5 [ 1683.747260][T21742] Mount JFS Failure: -5 [ 1683.751565][T21742] jfs_mount failed w/return code = -5 [ 1683.759344][T21766] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1683.864124][T21773] loop0: detected capacity change from 0 to 61456 [ 1683.883777][T21775] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:55 executing program 4: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8903, &(0x7f0000000000)={'geneve1\x00', @ifru_addrs=@tipc}) [ 1683.914846][T21773] jfs_mount: dbMount failed w/rc = -5 [ 1683.932199][T21773] Mount JFS Failure: -5 [ 1683.953243][T21773] jfs_mount failed w/return code = -5 20:02:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xffffff9e}}}, 0xb8}}, 0x0) 20:02:56 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000800)) [ 1683.993790][T21782] loop1: detected capacity change from 0 to 61456 20:02:56 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1684.100282][T21782] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1684.126406][T21782] Mount JFS Failure: -5 [ 1684.153273][T21782] jfs_mount failed w/return code = -5 20:02:56 executing program 4: r0 = socket(0x2, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000014c0)={&(0x7f0000000000)=@abs, 0x2000006e, 0x0}, 0x0) [ 1684.174024][T21795] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1684.177509][T21786] loop2: detected capacity change from 0 to 178 20:02:56 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010000000", 0x30, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1684.307245][T21801] loop0: detected capacity change from 0 to 61456 [ 1684.632266][T21786] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1684.632266][T21786] [ 1684.651533][T21801] jfs_mount: dbMount failed w/rc = -5 [ 1684.660650][T21808] loop1: detected capacity change from 0 to 61456 [ 1684.663259][T21786] ERROR: (device loop2): remounting filesystem as read-only [ 1684.671533][T21801] Mount JFS Failure: -5 [ 1684.686503][T21786] xtLookup: xtSearch returned -5 [ 1684.695452][T21801] jfs_mount failed w/return code = -5 [ 1684.749258][T21786] read_mapping_page failed! [ 1684.768502][T21786] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1684.805005][T21786] Mount JFS Failure: -5 [ 1684.821925][T21786] jfs_mount failed w/return code = -5 [ 1684.886796][T21808] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1684.901618][T21808] Mount JFS Failure: -5 [ 1684.906442][T21808] jfs_mount failed w/return code = -5 20:02:57 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xfffffff0}}}, 0xb8}}, 0x0) 20:02:57 executing program 4: syz_emit_ethernet(0x36, &(0x7f00000000c0)={@local, @broadcast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "8ee3ca", 0x0, 0x2c, 0x0, @private2, @local}}}}, 0x0) 20:02:57 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x6b, &(0x7f0000000000)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x11000) 20:02:57 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:57 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200"/40, 0x28, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:57 executing program 4: r0 = socket(0x11, 0xa, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) [ 1685.089105][T21823] loop0: detected capacity change from 0 to 61456 [ 1685.089823][T21826] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:57 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000001780)={0x12, 0x3, &(0x7f0000000100)=@framed, &(0x7f0000000180)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) [ 1685.150126][T21823] jfs_mount: dbMount failed w/rc = -5 [ 1685.171055][T21823] Mount JFS Failure: -5 [ 1685.186793][T21823] jfs_mount failed w/return code = -5 20:02:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x40030000000000}}}, 0xb8}}, 0x0) [ 1685.215875][T21832] loop1: detected capacity change from 0 to 61456 20:02:57 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1685.256418][T21832] read_mapping_page failed! [ 1685.266821][T21832] jfs_mount: dbMount failed w/rc = -5 [ 1685.292781][T21832] Mount JFS Failure: -5 [ 1685.331454][T21832] jfs_mount failed w/return code = -5 20:02:57 executing program 4: r0 = socket$kcm(0x29, 0x2, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(r0, 0x89e2, &(0x7f0000000100)={0xffffffffffffffff}) sendmsg$nl_route_sched(r1, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)=@delqdisc={0x24}, 0x24}}, 0x0) 20:02:57 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200"/40, 0x28, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1685.452612][T21835] loop2: detected capacity change from 0 to 178 [ 1685.483758][T21848] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1685.575880][T21852] loop0: detected capacity change from 0 to 61456 [ 1685.654010][T21852] jfs_mount: dbMount failed w/rc = -5 [ 1685.684772][T21856] loop1: detected capacity change from 0 to 61456 [ 1685.696275][T21852] Mount JFS Failure: -5 [ 1685.718104][T21852] jfs_mount failed w/return code = -5 [ 1685.738892][T21835] jfs_mount: dbMount failed w/rc = -5 [ 1685.749808][T21835] Mount JFS Failure: -5 [ 1685.751401][T21856] read_mapping_page failed! [ 1685.754424][T21835] jfs_mount failed w/return code = -5 [ 1685.776707][T21856] jfs_mount: dbMount failed w/rc = -5 [ 1685.785944][T21856] Mount JFS Failure: -5 [ 1685.795268][T21856] jfs_mount failed w/return code = -5 20:02:57 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:57 executing program 3: openat$tun(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) 20:02:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xe0ffff00000000}}}, 0xb8}}, 0x0) 20:02:57 executing program 4: r0 = socket(0x2, 0x2, 0x0) connect$can_bcm(r0, &(0x7f0000000100), 0x10) 20:02:57 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:58 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200"/40, 0x28, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:58 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$unix(r0, &(0x7f00000098c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x101) 20:02:58 executing program 3: syz_open_procfs$userns(0x0, &(0x7f0000002540)) [ 1685.991203][T21872] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:02:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xf0ffffffffffff}}}, 0xb8}}, 0x0) [ 1686.058914][T21876] loop0: detected capacity change from 0 to 61456 [ 1686.095404][T21876] jfs_mount: dbMount failed w/rc = -5 [ 1686.126693][T21876] Mount JFS Failure: -5 [ 1686.152924][T21876] jfs_mount failed w/return code = -5 [ 1686.167054][T21882] loop1: detected capacity change from 0 to 61456 [ 1686.215638][T21874] loop2: detected capacity change from 0 to 178 [ 1686.268708][T21882] read_mapping_page failed! 20:02:58 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:58 executing program 4: openat$cgroup_root(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/syz0\x00', 0x200002, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000001780)='./cgroup.net/syz0\x00', 0x200002, 0x0) [ 1686.290897][T21882] jfs_mount: dbMount failed w/rc = -5 [ 1686.320435][T21892] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1686.335023][T21882] Mount JFS Failure: -5 20:02:58 executing program 3: r0 = socket(0xa, 0x3, 0x5) syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r0) [ 1686.346846][T21882] jfs_mount failed w/return code = -5 [ 1686.453893][T21874] jfs_mount: dbMount failed w/rc = -5 [ 1686.466510][T21874] Mount JFS Failure: -5 [ 1686.484470][T21874] jfs_mount failed w/return code = -5 20:02:58 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x100000000000000}}}, 0xb8}}, 0x0) 20:02:58 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000", 0x2c, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:58 executing program 3: r0 = socket(0x2, 0x2, 0x0) sendmsg$unix(r0, &(0x7f00000014c0)={&(0x7f0000000000)=@abs, 0x6e, 0x0}, 0x0) 20:02:58 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800000000000000000000ffffe0000001"], 0x0) [ 1686.596466][T21902] loop0: detected capacity change from 0 to 61456 20:02:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x200000000000000}}}, 0xb8}}, 0x0) [ 1686.701051][T21902] jfs_mount: dbMount failed w/rc = -5 20:02:58 executing program 3: r0 = socket(0x22, 0x2, 0x2) getsockname$unix(r0, 0x0, 0x0) [ 1686.773418][T21902] Mount JFS Failure: -5 [ 1686.805980][T21907] loop1: detected capacity change from 0 to 61456 [ 1686.814567][T21902] jfs_mount failed w/return code = -5 20:02:59 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:59 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800000000000000000000ffffe0000001"], 0x0) 20:02:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x300000000000000}}}, 0xb8}}, 0x0) 20:02:59 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000014c0), 0x0, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) [ 1687.105275][T21916] loop2: detected capacity change from 0 to 178 [ 1687.127742][T21907] read_mapping_page failed! [ 1687.132840][T21907] jfs_mount: dbMount failed w/rc = -5 [ 1687.154656][T21907] Mount JFS Failure: -5 [ 1687.172971][T21907] jfs_mount failed w/return code = -5 20:02:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x400000000000000}}}, 0xb8}}, 0x0) [ 1687.442310][T21931] loop0: detected capacity change from 0 to 61456 [ 1687.612813][T21940] __nla_validate_parse: 3 callbacks suppressed [ 1687.612832][T21940] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1687.648120][T21916] jfs_mount: dbMount failed w/rc = -5 [ 1687.664512][T21916] Mount JFS Failure: -5 [ 1687.680134][T21916] jfs_mount failed w/return code = -5 20:02:59 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:02:59 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000", 0x2c, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:02:59 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800000000000000000000ffffe0000001"], 0x0) 20:02:59 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000014c0), 0x0, 0x0) ioctl$PTP_ENABLE_PPS(r0, 0x40043d04, 0x0) 20:02:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x500000000000000}}}, 0xb8}}, 0x0) [ 1687.824285][T21931] jfs_mount: dbMount failed w/rc = -5 [ 1687.857969][T21931] Mount JFS Failure: -5 [ 1687.873376][T21931] jfs_mount failed w/return code = -5 20:02:59 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800000000000000000000ffffe0000001"], 0x0) 20:03:00 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000080)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x2, 0x0, @loopback}, r1}}, 0x30) [ 1687.957374][T21951] loop1: detected capacity change from 0 to 61456 [ 1687.985750][T21955] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1688.041052][T21951] read_mapping_page failed! 20:03:00 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x600000000000000}}}, 0xb8}}, 0x0) [ 1688.066986][T21951] jfs_mount: dbMount failed w/rc = -5 [ 1688.122785][T21951] Mount JFS Failure: -5 [ 1688.151572][T21951] jfs_mount failed w/return code = -5 20:03:00 executing program 4: syz_emit_ethernet(0x33f, 0x0, 0x0) [ 1688.193162][T21953] loop2: detected capacity change from 0 to 178 20:03:00 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x4020940d, 0x0) 20:03:00 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000", 0x2c, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1688.310239][T21970] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1688.372241][T21953] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1688.372241][T21953] [ 1688.383395][T21973] loop0: detected capacity change from 0 to 61456 [ 1688.415740][T21953] ERROR: (device loop2): remounting filesystem as read-only [ 1688.461685][T21953] xtLookup: xtSearch returned -5 [ 1688.501682][T21953] read_mapping_page failed! [ 1688.541050][T21953] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1688.573881][T21980] loop1: detected capacity change from 0 to 61456 [ 1688.583478][T21953] Mount JFS Failure: -5 [ 1688.610237][T21953] jfs_mount failed w/return code = -5 [ 1688.641251][T21980] read_mapping_page failed! [ 1688.643141][T21973] jfs_mount: dbMount failed w/rc = -5 [ 1688.657243][T21980] jfs_mount: dbMount failed w/rc = -5 [ 1688.661285][T21973] Mount JFS Failure: -5 [ 1688.667637][T21973] jfs_mount failed w/return code = -5 [ 1688.685384][T21980] Mount JFS Failure: -5 [ 1688.691717][T21980] jfs_mount failed w/return code = -5 20:03:00 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x700000000000000}}}, 0xb8}}, 0x0) 20:03:00 executing program 4: syz_emit_ethernet(0x33f, 0x0, 0x0) 20:03:00 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x891c, &(0x7f0000000000)={'geneve1\x00', @ifru_addrs=@tipc}) 20:03:00 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:00 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:01 executing program 4: syz_emit_ethernet(0x33f, 0x0, 0x0) 20:03:01 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000080), 0x71d, 0x0) pread64(r0, &(0x7f00000000c0)=""/78, 0x4e, 0x0) [ 1688.978925][T21995] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x800000000000000}}}, 0xb8}}, 0x0) [ 1689.072170][T22002] loop0: detected capacity change from 0 to 61456 [ 1689.147843][T21997] loop1: detected capacity change from 0 to 61456 [ 1689.182185][T21998] loop2: detected capacity change from 0 to 178 [ 1689.217923][T22002] jfs_mount: dbMount failed w/rc = -5 20:03:01 executing program 3: r0 = openat$ptp0(0xffffffffffffff9c, &(0x7f00000014c0), 0x0, 0x0) ioctl$PTP_PIN_GETFUNC(r0, 0xc0603d06, 0x0) 20:03:01 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[], 0x0) [ 1689.260552][T22002] Mount JFS Failure: -5 [ 1689.304780][T22002] jfs_mount failed w/return code = -5 [ 1689.351513][T22014] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:01 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1689.534146][T21997] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1689.568229][T21997] Mount JFS Failure: -5 [ 1689.608556][T21997] jfs_mount failed w/return code = -5 [ 1689.711747][T21998] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1689.711747][T21998] [ 1689.723468][T22022] loop0: detected capacity change from 0 to 61456 [ 1689.732522][T21998] ERROR: (device loop2): remounting filesystem as read-only [ 1689.746206][T21998] xtLookup: xtSearch returned -5 [ 1689.754703][T21998] read_mapping_page failed! [ 1689.761317][T22022] jfs_mount: dbMount failed w/rc = -5 [ 1689.773182][T22022] Mount JFS Failure: -5 [ 1689.778283][T21998] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1689.789373][T22022] jfs_mount failed w/return code = -5 [ 1689.800401][T21998] Mount JFS Failure: -5 [ 1689.811715][T21998] jfs_mount failed w/return code = -5 20:03:01 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[], 0x0) 20:03:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x900000000000000}}}, 0xb8}}, 0x0) 20:03:01 executing program 3: socketpair(0x22, 0x3, 0x0, &(0x7f0000001280)) 20:03:01 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000", 0x2c, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:01 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:01 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:02 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[], 0x0) 20:03:02 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0x40505331, &(0x7f0000000100)={0x10000}) [ 1689.988076][T22041] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xa00000000000000}}}, 0xb8}}, 0x0) [ 1690.061627][T22044] loop0: detected capacity change from 0 to 61456 [ 1690.150391][T22044] jfs_mount: dbMount failed w/rc = -5 [ 1690.152605][T22042] loop1: detected capacity change from 0 to 61456 [ 1690.185383][T22043] loop2: detected capacity change from 0 to 178 [ 1690.194975][T22044] Mount JFS Failure: -5 [ 1690.209162][T22044] jfs_mount failed w/return code = -5 20:03:02 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:02 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) 20:03:02 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0x408c5333, &(0x7f0000000100)={0x10000}) [ 1690.462514][T22058] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1690.536996][T22042] read_mapping_page failed! 20:03:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xe00000000000000}}}, 0xb8}}, 0x0) [ 1690.560697][T22042] jfs_mount: dbMount failed w/rc = -5 [ 1690.600712][T22042] Mount JFS Failure: -5 [ 1690.637847][T22042] jfs_mount failed w/return code = -5 [ 1690.670236][T22043] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1690.670236][T22043] [ 1690.683771][T22063] loop0: detected capacity change from 0 to 61456 [ 1690.707623][T22043] ERROR: (device loop2): remounting filesystem as read-only [ 1690.717751][T22043] xtLookup: xtSearch returned -5 [ 1690.732260][T22063] jfs_mount: dbMount failed w/rc = -5 20:03:02 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) [ 1690.741207][T22043] read_mapping_page failed! [ 1690.749016][T22063] Mount JFS Failure: -5 [ 1690.761774][T22043] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1690.772897][T22063] jfs_mount failed w/return code = -5 20:03:02 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000", 0x2c, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:02 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0xd0, r1, 0x1, 0x0, 0x0, {}, [{@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}]}, 0xd0}}, 0x0) [ 1690.806260][T22043] Mount JFS Failure: -5 [ 1690.819290][T22043] jfs_mount failed w/return code = -5 20:03:02 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:02 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1690.858960][T22071] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xf00000000000000}}}, 0xb8}}, 0x0) [ 1690.940005][T22080] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.3'. 20:03:03 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB], 0x0) [ 1690.998486][T22083] netlink: 128 bytes leftover after parsing attributes in process `syz-executor.3'. 20:03:03 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_MIGRATE_ID(r0, &(0x7f0000000180)={0x12, 0x10, 0xfa00, {0x0, 0xffffffffffffffff, r0}}, 0x18) [ 1691.085596][T22086] loop0: detected capacity change from 0 to 61456 20:03:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x1f00000000000000}}}, 0xb8}}, 0x0) 20:03:03 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000"], 0x0) [ 1691.151090][T22086] jfs_mount: dbMount failed w/rc = -5 [ 1691.181411][T22086] Mount JFS Failure: -5 [ 1691.214627][T22086] jfs_mount failed w/return code = -5 20:03:03 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1691.275751][T22087] loop1: detected capacity change from 0 to 61456 [ 1691.309891][T22090] loop2: detected capacity change from 0 to 178 20:03:03 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000003ec0)={0xe, 0x4, 0x0, 0x2}, 0x40) 20:03:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x2000000000000000}}}, 0xb8}}, 0x0) [ 1691.690243][T22087] read_mapping_page failed! [ 1691.697888][T22087] jfs_mount: dbMount failed w/rc = -5 [ 1691.706513][T22110] loop0: detected capacity change from 0 to 61456 [ 1691.722368][T22087] Mount JFS Failure: -5 [ 1691.754237][T22087] jfs_mount failed w/return code = -5 [ 1691.796115][T22110] jfs_mount: dbMount failed w/rc = -5 [ 1691.834448][T22110] Mount JFS Failure: -5 [ 1691.853247][T22110] jfs_mount failed w/return code = -5 20:03:03 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000", 0x2c, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:03 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000"], 0x0) [ 1691.877062][T22090] jfs_mount: dbMount failed w/rc = -5 [ 1691.890804][T22090] Mount JFS Failure: -5 [ 1691.895725][T22090] jfs_mount failed w/return code = -5 20:03:04 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x3207000000000000}}}, 0xb8}}, 0x0) 20:03:04 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x8953, &(0x7f0000000000)={'geneve1\x00', @ifru_addrs=@tipc}) 20:03:04 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:04 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000"], 0x0) 20:03:04 executing program 3: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=@in={0x2, 0x0, @loopback}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000200)="0e", 0x1}], 0x1}], 0x1, 0x0) 20:03:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x3610000000000000}}}, 0xb8}}, 0x0) [ 1692.093717][T22128] loop1: detected capacity change from 0 to 61456 [ 1692.152492][T22128] read_mapping_page failed! [ 1692.174467][T22128] jfs_mount: dbMount failed w/rc = -5 [ 1692.199557][T22140] loop0: detected capacity change from 0 to 61456 [ 1692.211250][T22128] Mount JFS Failure: -5 20:03:04 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe800000000000000000000000000028000000"], 0x0) [ 1692.233157][T22128] jfs_mount failed w/return code = -5 20:03:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x4800000000000000}}}, 0xb8}}, 0x0) [ 1692.275272][T22140] Mount JFS Failure: -22 [ 1692.277683][T22136] loop2: detected capacity change from 0 to 178 [ 1692.309897][T22140] jfs_mount failed w/return code = -22 20:03:04 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:04 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:04 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe800000000000000000000000000028000000"], 0x0) [ 1692.444562][T22136] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1692.444562][T22136] [ 1692.477630][T22136] ERROR: (device loop2): remounting filesystem as read-only [ 1692.485879][T22136] xtLookup: xtSearch returned -5 [ 1692.502726][T22136] read_mapping_page failed! [ 1692.521623][T22136] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1692.534559][T22158] loop1: detected capacity change from 0 to 61456 [ 1692.563113][T22136] Mount JFS Failure: -5 [ 1692.582719][T22158] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1692.602266][T22136] jfs_mount failed w/return code = -5 [ 1692.602481][T22158] Mount JFS Failure: -5 [ 1692.638660][T22158] jfs_mount failed w/return code = -5 [ 1692.690698][T22161] loop0: detected capacity change from 0 to 61456 20:03:04 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x4c00000000000000}}}, 0xb8}}, 0x0) 20:03:04 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe800000000000000000000000000028000000"], 0x0) 20:03:04 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1692.872364][T22174] __nla_validate_parse: 6 callbacks suppressed [ 1692.872385][T22174] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:05 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800"/48], 0x0) [ 1692.915677][T22161] Mount JFS Failure: -22 [ 1692.925169][T22176] loop1: detected capacity change from 0 to 61456 [ 1692.925169][T22161] jfs_mount failed w/return code = -22 20:03:05 executing program 3: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, 0x0, 0x0) sendmmsg$inet_sctp(r0, &(0x7f0000000380)=[{&(0x7f00000001c0)=@in={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000200)="0e253781fb95bbbfbacde85961b8306791b6feeeeda2be739e1121b64cf0f9f7ccae4841696a7601511a060f1051ea78547d8efd240b7274064445571ad0f9be0c03a123e64305cb954364a6bea4c51e3d", 0x51}], 0x1}], 0x1, 0x48040) [ 1693.002372][T22176] jfs_mount: diMount(ipaimap2) failed, rc = -5 20:03:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x6000000000000000}}}, 0xb8}}, 0x0) [ 1693.044800][T22176] Mount JFS Failure: -5 20:03:05 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1693.091228][T22176] jfs_mount failed w/return code = -5 20:03:05 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800"/48], 0x0) 20:03:05 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010", 0x2d, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:05 executing program 3: r0 = syz_io_uring_setup(0x6781, &(0x7f0000000040), &(0x7f0000a8f000/0x4000)=nil, &(0x7f0000000000/0xa000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) r1 = socket$unix(0x1, 0x2, 0x0) io_uring_register$IORING_REGISTER_FILES(r0, 0x2, &(0x7f0000000140)=[r1, 0xffffffffffffffff], 0x2) [ 1693.159532][T22181] loop2: detected capacity change from 0 to 178 [ 1693.194740][T22190] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x6800000000000000}}}, 0xb8}}, 0x0) [ 1693.301831][T22199] loop0: detected capacity change from 0 to 61456 [ 1693.373801][T22181] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1693.373801][T22181] [ 1693.384932][T22199] Mount JFS Failure: -22 [ 1693.397119][T22203] loop1: detected capacity change from 0 to 61456 [ 1693.404618][T22181] ERROR: (device loop2): remounting filesystem as read-only [ 1693.424301][T22199] jfs_mount failed w/return code = -22 [ 1693.437253][T22181] xtLookup: xtSearch returned -5 [ 1693.449069][T22208] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1693.462675][T22203] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1693.463015][T22181] read_mapping_page failed! [ 1693.484435][T22203] Mount JFS Failure: -5 [ 1693.500953][T22181] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1693.541131][T22181] Mount JFS Failure: -5 [ 1693.548517][T22203] jfs_mount failed w/return code = -5 [ 1693.560544][T22181] jfs_mount failed w/return code = -5 20:03:05 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:05 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800"/48], 0x0) 20:03:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x6c00000000000000}}}, 0xb8}}, 0x0) 20:03:05 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000000), 0x0, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x10, r0, 0x10000000) 20:03:05 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:05 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:05 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800000000000000000000ffffe0"], 0x0) [ 1693.771494][T22225] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1693.811400][T22228] loop0: detected capacity change from 0 to 61456 20:03:05 executing program 3: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001840)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_SET_OPTION(r0, &(0x7f00000000c0)={0xe, 0x18, 0xfa00, @id_afonly={&(0x7f0000000080), r1, 0x0, 0x2, 0x4}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0xa, 0x0, 0x0, @loopback}, r1}}, 0x30) 20:03:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x7400000000000000}}}, 0xb8}}, 0x0) [ 1693.919226][T22228] Mount JFS Failure: -22 [ 1693.938073][T22226] loop1: detected capacity change from 0 to 61456 [ 1693.964805][T22228] jfs_mount failed w/return code = -22 [ 1694.034338][T22230] loop2: detected capacity change from 0 to 178 20:03:06 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:06 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800"/48], 0x0) [ 1694.099636][T22241] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:06 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x541b, &(0x7f0000000000)={'geneve1\x00', @ifru_addrs=@tipc}) [ 1694.239916][T22226] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1694.239916][T22226] [ 1694.305096][T22230] jfs_mount: dbMount failed w/rc = -5 [ 1694.336158][T22226] ERROR: (device loop1): remounting filesystem as read-only [ 1694.336545][T22230] Mount JFS Failure: -5 [ 1694.343856][T22226] xtLookup: xtSearch returned -5 [ 1694.343897][T22226] read_mapping_page failed! [ 1694.344122][T22226] jfs_mount: dbMount failed w/rc = -5 [ 1694.396491][T22226] Mount JFS Failure: -5 [ 1694.398903][T22230] jfs_mount failed w/return code = -5 [ 1694.407900][T22250] loop0: detected capacity change from 0 to 61456 [ 1694.435646][T22226] jfs_mount failed w/return code = -5 20:03:06 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x7a00000000000000}}}, 0xb8}}, 0x0) 20:03:06 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800"/48], 0x0) 20:03:06 executing program 3: r0 = socket$unix(0x1, 0x5, 0x0) sendmsg$unix(r0, &(0x7f0000001280)={0x0, 0x0, 0x0, 0x40000}, 0x0) 20:03:06 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:06 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800"/48], 0x0) 20:03:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x2f5530}], 0x8, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280), 0x4e, &(0x7f0000000000), 0x0, 0x3f00}, 0x0) sendmsg$kcm(r1, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x0) [ 1694.628232][T22250] Mount JFS Failure: -22 [ 1694.638687][T22250] jfs_mount failed w/return code = -22 [ 1694.646633][T22263] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x80ffffff00000000}}}, 0xb8}}, 0x0) 20:03:06 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:06 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800000000000000000000ffff"], 0x0) [ 1694.855250][T22269] loop1: detected capacity change from 0 to 61456 [ 1694.960145][T22268] loop2: detected capacity change from 0 to 178 [ 1694.973112][T22282] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x9effffff00000000}}}, 0xb8}}, 0x0) [ 1695.112872][T22287] loop0: detected capacity change from 0 to 61456 [ 1695.139004][T22269] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1695.139004][T22269] 20:03:07 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800000000000000000000ff"], 0x0) [ 1695.216665][T22269] ERROR: (device loop1): remounting filesystem as read-only [ 1695.216704][T22269] xtLookup: xtSearch returned -5 [ 1695.249943][T22287] Mount JFS Failure: -22 [ 1695.296352][T22268] Mount JFS Failure: -22 [ 1695.299675][T22287] jfs_mount failed w/return code = -22 [ 1695.312190][T22268] jfs_mount failed w/return code = -22 [ 1695.312834][T22269] read_mapping_page failed! [ 1695.360980][T22292] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1695.374846][T22269] jfs_mount: dbMount failed w/rc = -5 [ 1695.424583][T22269] Mount JFS Failure: -5 20:03:07 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:07 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xf0ffffff00000000}}}, 0xb8}}, 0x0) [ 1695.460952][T22269] jfs_mount failed w/return code = -5 20:03:07 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:07 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800"/48], 0x0) [ 1695.666939][T22305] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x203, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair(0x1e, 0x1, 0x0, &(0x7f0000000140)={0x0, 0x0}) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000380), 0x10000023, &(0x7f00000002c0)=""/77, 0x42e}, 0x0) recvmsg$kcm(r0, &(0x7f0000000200)={&(0x7f0000000040)=@ax25, 0xfe76, &(0x7f0000000000)=[{&(0x7f0000000080)=""/151, 0x2f5530}], 0x8, &(0x7f00000001c0)=""/4, 0x10036, 0x7301}, 0x3f9c) sendmsg(r1, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000280), 0x4e, &(0x7f0000000000), 0x0, 0x3f00}, 0x0) sendmsg$kcm(r1, &(0x7f0000000ec0)={0x0, 0x0, 0x0}, 0x0) 20:03:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xffffff7f00000000}}}, 0xb8}}, 0x0) [ 1695.757433][T22307] loop0: detected capacity change from 0 to 61456 [ 1695.866951][T22306] loop2: detected capacity change from 0 to 178 20:03:07 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800"/48], 0x0) [ 1695.981290][T22307] Mount JFS Failure: -22 [ 1696.014824][T22307] jfs_mount failed w/return code = -22 [ 1696.046201][T22315] loop1: detected capacity change from 0 to 61456 [ 1696.093623][T22323] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:08 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0xfffffffffffff000}}}, 0xb8}}, 0x0) 20:03:08 executing program 4: syz_emit_ethernet(0x33f, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaa00000000000086dd647e08b403092101fe80000000000000000000000000002800"/48], 0x0) [ 1696.392963][T22315] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1696.392963][T22315] [ 1696.430257][T22306] Mount JFS Failure: -22 [ 1696.439031][T22306] jfs_mount failed w/return code = -22 [ 1696.445243][T22315] ERROR: (device loop1): remounting filesystem as read-only 20:03:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) [ 1696.493354][T22315] xtLookup: xtSearch returned -5 20:03:08 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000200)=[{0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1696.533371][T22315] read_mapping_page failed! 20:03:08 executing program 4: r0 = socket(0x22, 0x2, 0x3) recvmsg$can_bcm(r0, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x13042) [ 1696.569236][T22315] jfs_mount: dbMount failed w/rc = -5 [ 1696.602791][T22334] loop0: detected capacity change from 0 to 61456 [ 1696.615185][T22315] Mount JFS Failure: -5 [ 1696.630929][T22315] jfs_mount failed w/return code = -5 20:03:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x3}}}, 0xb8}}, 0x0) [ 1696.691155][T22334] Mount JFS Failure: -22 20:03:08 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:08 executing program 4: r0 = socket(0x2, 0x2, 0x0) recvmsg$can_bcm(r0, &(0x7f0000001400)={0x0, 0x0, 0x0}, 0x2000) [ 1696.720009][T22334] jfs_mount failed w/return code = -22 20:03:08 executing program 3: r0 = socket(0x22, 0x2, 0x10) ioctl$sock_ifreq(r0, 0x0, 0x0) 20:03:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x4}}}, 0xb8}}, 0x0) 20:03:08 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:08 executing program 4: r0 = shmat(0x0, &(0x7f0000400000/0xc00000)=nil, 0x4000) syz_io_uring_setup(0x7b0b, &(0x7f0000000000), &(0x7f0000fff000/0x1000)=nil, &(0x7f0000fff000/0x1000)=nil, 0x0, 0x0) shmdt(r0) [ 1696.952553][T22360] delete_channel: no stack [ 1696.958096][T22360] delete_channel: no stack [ 1696.966548][T22346] loop2: detected capacity change from 0 to 178 20:03:09 executing program 3: r0 = socket$inet_sctp(0x2, 0x1, 0x84) setsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX_OLD(r0, 0x84, 0x22, &(0x7f0000000000)=[@in={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}], 0x10) 20:03:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x5}}}, 0xb8}}, 0x0) [ 1697.066851][T22356] loop1: detected capacity change from 0 to 61456 [ 1697.097138][T22366] loop0: detected capacity change from 0 to 61456 [ 1697.170869][T22346] Mount JFS Failure: -22 20:03:09 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = syz_genetlink_get_family_id$devlink(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_RELOAD(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f0000000140)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 1697.191644][T22346] jfs_mount failed w/return code = -22 [ 1697.203037][T22366] Mount JFS Failure: -22 [ 1697.213219][T22366] jfs_mount failed w/return code = -22 20:03:09 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x6}}}, 0xb8}}, 0x0) 20:03:09 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8940, 0x0) [ 1697.320949][T22356] jfs_mount: dbMount failed w/rc = -5 [ 1697.337449][T22356] Mount JFS Failure: -5 [ 1697.342114][T22356] jfs_mount failed w/return code = -5 20:03:09 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:09 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009201000000000", 0x2c, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000009b00)={0x0, 0x0, &(0x7f0000009a80)=[{&(0x7f0000009380)={0x24, 0x20, 0x1, 0x0, 0x0, "", [@typed={0x14, 0x0, 0x0, 0x0, @ipv6=@private0}]}, 0x24}], 0x1}, 0x0) 20:03:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x7}}}, 0xb8}}, 0x0) 20:03:09 executing program 3: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40086602, &(0x7f0000000040)) 20:03:09 executing program 4: socket$netlink(0x10, 0x3, 0x0) pselect6(0x40, &(0x7f0000000000), &(0x7f0000000040)={0x270c}, 0x0, 0x0, 0x0) [ 1697.628610][T22396] loop0: detected capacity change from 0 to 61456 [ 1697.666637][T22392] loop2: detected capacity change from 0 to 178 20:03:09 executing program 3: clock_gettime(0x0, &(0x7f00000003c0)={0x0}) clock_settime(0x0, &(0x7f0000000400)={r0}) 20:03:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x8}}}, 0xb8}}, 0x0) [ 1697.728046][T22404] loop1: detected capacity change from 0 to 61456 [ 1697.824813][T22404] jfs_mount: dbMount failed w/rc = -5 [ 1697.854939][T22392] Mount JFS Failure: -22 [ 1697.862807][T22392] jfs_mount failed w/return code = -22 [ 1697.873223][T22404] Mount JFS Failure: -5 [ 1697.890445][T22404] jfs_mount failed w/return code = -5 20:03:10 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f000000cf80)={0x0, 0x0, 0x0}, 0x101) [ 1697.972135][T22414] __nla_validate_parse: 7 callbacks suppressed [ 1697.972154][T22414] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1697.976310][T22396] jfs_mount: dbMount failed w/rc = -5 20:03:10 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1698.017199][T22396] Mount JFS Failure: -5 [ 1698.032030][T22396] jfs_mount failed w/return code = -5 20:03:10 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:10 executing program 3: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mmap$qrtrtun(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x2, 0x12, r0, 0x0) 20:03:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x9}}}, 0xb8}}, 0x0) 20:03:10 executing program 4: socket$nl_generic(0x10, 0x3, 0x10) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$TIPC_NL_NET_SET(r0, &(0x7f0000000500)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet_sctp(0x2, 0x5, 0x84) sendmmsg$inet_sctp(r1, &(0x7f0000000380)=[{&(0x7f00000001c0)=@in={0x2, 0x4e24, @loopback}, 0x10, &(0x7f0000000340)=[{&(0x7f0000000200)}, {&(0x7f00000002c0)="dacbd00bce", 0x5}, {0x0}], 0x3}], 0x1, 0x48040) 20:03:10 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1698.246305][T22433] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:10 executing program 3: r0 = getpgid(0x0) ptrace$setopts(0x4206, r0, 0xb80, 0x0) 20:03:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 1698.443886][T22438] loop0: detected capacity change from 0 to 61456 [ 1698.460357][T22430] loop1: detected capacity change from 0 to 61456 20:03:10 executing program 4: r0 = openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r0, &(0x7f0000000000)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000001840)={0xffffffffffffffff}, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_BIND_IP(r0, &(0x7f0000000280)={0x2, 0x28, 0xfa00, {0x0, {0x2, 0x0, 0x0, @private2}, r1}}, 0x30) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) openat$rdma_cm(0xffffffffffffff9c, &(0x7f0000000140), 0x2, 0x0) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000240)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000200)={0xffffffffffffffff}}}, 0x20) write$RDMA_USER_CM_CMD_QUERY(r0, &(0x7f00000002c0)={0x13, 0x10, 0xfa00, {&(0x7f0000000080), r3}}, 0x18) [ 1698.486470][T22434] loop2: detected capacity change from 0 to 178 [ 1698.522238][T22438] Mount JFS Failure: -22 20:03:10 executing program 3: r0 = syz_io_uring_setup(0x6781, &(0x7f0000000040), &(0x7f0000a8f000/0x4000)=nil, &(0x7f0000000000/0xa000)=nil, &(0x7f00000000c0), &(0x7f0000000100)) mmap$IORING_OFF_SQES(&(0x7f0000007000/0x2000)=nil, 0x2000, 0x12, 0x13, r0, 0x10000000) [ 1698.540813][T22446] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1698.574596][T22438] jfs_mount failed w/return code = -22 20:03:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xe}}}, 0xb8}}, 0x0) 20:03:10 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1698.765598][T22434] Mount JFS Failure: -22 [ 1698.770447][T22434] jfs_mount failed w/return code = -22 [ 1698.825796][T22430] jfs_mount: dbMount failed w/rc = -5 [ 1698.833994][T22430] Mount JFS Failure: -5 [ 1698.850749][T22430] jfs_mount failed w/return code = -5 [ 1698.887824][T22460] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:10 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{0x0, 0x0, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:10 executing program 4: r0 = socket(0xa, 0x3, 0x6) recvmmsg$unix(r0, &(0x7f00000009c0)=[{{0x0, 0x0, 0x0, 0x0, 0x0, 0x98}}], 0x1, 0x0, 0x0) 20:03:10 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {0x0, 0x0, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:10 executing program 3: r0 = socket(0x2, 0x2, 0x0) ioctl$sock_ifreq(r0, 0x890c, &(0x7f0000000000)={'geneve1\x00', @ifru_addrs=@tipc}) 20:03:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xf}}}, 0xb8}}, 0x0) [ 1699.019924][T22461] loop0: detected capacity change from 0 to 61456 [ 1699.254907][T22461] Mount JFS Failure: -22 [ 1699.262128][T22461] jfs_mount failed w/return code = -22 [ 1699.290940][T22477] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:11 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_genetlink_get_family_id$devlink(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(r0, &(0x7f0000002680)={&(0x7f0000002500), 0xc, &(0x7f0000002640)={&(0x7f00000026c0)={0x100, r1, 0x1, 0x0, 0x0, {}, [@nsim={{}, {0x0, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8}, {0x11}}, @pci={{0xffffffffffffff82}, {0x11}}, @nsim={{0xe}, {0xd, 0x2, {'netdevsim', 0x0}}}, @pci={{0x8}, {0x11}}, @pci, @pci={{0x8}, {0x11}}, @nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x100}}, 0x0) [ 1699.291850][T22476] loop1: detected capacity change from 0 to 61456 20:03:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x48}}}, 0xb8}}, 0x0) 20:03:11 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1699.425442][T22476] jfs_mount: dbMount failed w/rc = -5 [ 1699.459445][T22476] Mount JFS Failure: -5 [ 1699.484115][T22476] jfs_mount failed w/return code = -5 20:03:11 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000002c0), 0x1, 0x0) write$tun(r0, 0x0, 0x0) [ 1699.506771][T22478] loop2: detected capacity change from 0 to 178 20:03:11 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {0x0, 0x0, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:11 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x4c}}}, 0xb8}}, 0x0) [ 1699.606634][T22493] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1699.827530][T22478] Mount JFS Failure: -22 [ 1699.836860][T22495] loop0: detected capacity change from 0 to 61456 [ 1699.844063][T22478] jfs_mount failed w/return code = -22 20:03:11 executing program 4: syz_open_dev$vcsn(&(0x7f0000000040), 0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) pipe2(&(0x7f0000004fc0), 0x0) pselect6(0x40, &(0x7f0000000080)={0x300}, 0x0, &(0x7f0000000100)={0xffff}, 0x0, 0x0) 20:03:11 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1699.935343][T22503] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1699.967657][T22496] loop1: detected capacity change from 0 to 61456 20:03:11 executing program 3: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_CLIENT_POOL(r0, 0xc0a85322, &(0x7f0000000080)) 20:03:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x60}}}, 0xb8}}, 0x0) [ 1700.067739][T22496] jfs_mount: dbMount failed w/rc = -5 [ 1700.075938][T22495] Mount JFS Failure: -22 [ 1700.090352][T22495] jfs_mount failed w/return code = -22 [ 1700.103222][T22496] Mount JFS Failure: -5 20:03:12 executing program 4: r0 = socket$inet(0x2, 0x2, 0x0) connect$l2tp(r0, &(0x7f0000000000)={0x2, 0x0, @empty}, 0x10) [ 1700.127357][T22496] jfs_mount failed w/return code = -5 20:03:12 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003", 0x17, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:12 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {0x0, 0x0, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1700.215582][T22518] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:12 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000180)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(blowfish)\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000c18000)="ad56b6c5", 0x4) 20:03:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x68}}}, 0xb8}}, 0x0) 20:03:12 executing program 4: mbind(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x3, &(0x7f0000000500)=0x7fff, 0x6ee6, 0x0) [ 1700.420328][T22523] loop2: detected capacity change from 0 to 178 [ 1700.442420][T22531] loop0: detected capacity change from 0 to 61456 20:03:12 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) [ 1700.537478][T22529] loop1: detected capacity change from 0 to 61456 [ 1700.607499][T22531] jfs_mount: dbMount failed w/rc = -5 [ 1700.641581][T22531] Mount JFS Failure: -5 [ 1700.643965][T22542] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:12 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x14}, 0x40) [ 1700.687952][T22531] jfs_mount failed w/return code = -5 20:03:12 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x6c}}}, 0xb8}}, 0x0) [ 1700.823275][T22529] jfs_mount: dbMount failed w/rc = -5 [ 1700.846871][T22529] Mount JFS Failure: -5 [ 1700.879037][T22529] jfs_mount failed w/return code = -5 [ 1700.945710][T22523] Mount JFS Failure: -22 [ 1700.960384][T22523] jfs_mount failed w/return code = -22 20:03:13 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:13 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003", 0x17, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:13 executing program 4: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$RTC_ALM_SET(r0, 0x40247007, 0x0) 20:03:13 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100), 0x0, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1701.098502][T22556] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x74}}}, 0xb8}}, 0x0) 20:03:13 executing program 4: r0 = socket$l2tp(0x2, 0x2, 0x73) recvmmsg(r0, &(0x7f000000ce80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x62, 0x0) [ 1701.296190][T22564] loop0: detected capacity change from 0 to 61456 [ 1701.324193][T22562] loop1: detected capacity change from 0 to 61456 [ 1701.406493][T22564] jfs_mount: dbMount failed w/rc = -5 [ 1701.455263][T22564] Mount JFS Failure: -5 20:03:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x7a}}}, 0xb8}}, 0x0) [ 1701.495283][T22566] loop2: detected capacity change from 0 to 178 [ 1701.510290][T22564] jfs_mount failed w/return code = -5 20:03:13 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80) r1 = socket$inet6(0x10, 0x80000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r3}}}}, @IFLA_MASTER={0x8, 0xd}]}, 0x40}}, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) 20:03:13 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003", 0x17, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:13 executing program 3: bpf$MAP_CREATE(0x0, &(0x7f0000000500)={0x1b, 0x0, 0x0, 0x1000000}, 0x40) [ 1701.687407][T22562] jfs_mount: dbMount failed w/rc = -5 [ 1701.741876][T22562] Mount JFS Failure: -5 [ 1701.775222][T22562] jfs_mount failed w/return code = -5 20:03:13 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xf0}}}, 0xb8}}, 0x0) 20:03:13 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100), 0x0, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1701.862250][T22566] Mount JFS Failure: -22 [ 1701.876514][T22566] jfs_mount failed w/return code = -22 [ 1701.961011][T22588] loop0: detected capacity change from 0 to 61456 [ 1702.021833][T22588] jfs_mount: dbMount failed w/rc = -5 [ 1702.070460][T22588] Mount JFS Failure: -5 [ 1702.100738][T22588] jfs_mount failed w/return code = -5 20:03:14 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000), 0x0, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x300}}}, 0xb8}}, 0x0) 20:03:14 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020", 0x22, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1702.203737][T20302] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1702.279539][T22594] loop1: detected capacity change from 0 to 61456 20:03:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x500}}}, 0xb8}}, 0x0) [ 1702.421782][T22605] loop0: detected capacity change from 0 to 61456 20:03:14 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'xcbc(aes)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000100)="0a0775b0d5e383e5b3c066ff000000e2", 0x10) sendmmsg(r1, &(0x7f0000006ac0)=[{{0x0, 0x0, &(0x7f0000000340)=[{&(0x7f00000000c0)='C', 0x1}, {&(0x7f0000000200)="1d3b098aa0720e7f45f208ddf2a695eb234c291a34cb318385ced3bf6d692249cbca32abe9dac969dbfbd4cf9e1e", 0x2e}], 0x2}}], 0x1, 0x0) [ 1702.572186][T22594] jfs_mount: dbMount failed w/rc = -5 [ 1702.590943][T22594] Mount JFS Failure: -5 [ 1702.610404][T22605] jfs_mount: dbMount failed w/rc = -5 [ 1702.621317][T22594] jfs_mount failed w/return code = -5 [ 1702.657974][T22605] Mount JFS Failure: -5 20:03:14 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x600}}}, 0xb8}}, 0x0) [ 1702.753381][T22608] loop2: detected capacity change from 0 to 178 [ 1702.753719][T22605] jfs_mount failed w/return code = -5 20:03:14 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100), 0x0, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1703.032041][T22621] __nla_validate_parse: 5 callbacks suppressed [ 1703.032060][T22621] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1703.131381][T22608] Mount JFS Failure: -22 [ 1703.136730][T22608] jfs_mount failed w/return code = -22 [ 1703.137739][T22585] ppp0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1703.320505][T22631] loop1: detected capacity change from 0 to 61456 [ 1703.453922][T22631] jfs_mount: dbMount failed w/rc = -5 [ 1703.475203][T22631] Mount JFS Failure: -5 [ 1703.480800][T22631] jfs_mount failed w/return code = -5 [ 1704.120677][T22585] ppp0: default qdisc (pfifo_fast) fail, fallback to noqueue 20:03:17 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$system_posix_acl(0x0, 0x0, 0x0, 0x0, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x80) r1 = socket$inet6(0x10, 0x80000, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r2, &(0x7f0000000180)={0x0, 0xc, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x40, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r3}}}}, @IFLA_MASTER={0x8, 0xd}]}, 0x40}}, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) 20:03:17 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c000300", 0x18, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$nl_route(0x10, 0x3, 0x0) creat(&(0x7f0000000240)='./file0\x00', 0x80) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$ifreq_SIOCGIFINDEX_team(r2, 0x8933, &(0x7f0000000100)={'team0\x00', 0x0}) sendmsg$nl_route(r1, &(0x7f0000000080)={0x0, 0xe7010000, &(0x7f0000000140)={&(0x7f0000000700)=@newlink={0x3c, 0x10, 0x401, 0x0, 0x0, {}, [@IFLA_IFNAME={0x14, 0x3, 'ipvlan1\x00'}, @IFLA_MASTER={0x8, 0xa, r3}]}, 0x3c}}, 0x0) socket(0x0, 0x0, 0x0) ioctl$DRM_IOCTL_MODE_CREATE_LEASE(0xffffffffffffffff, 0xc01864c6, &(0x7f00000000c0)={&(0x7f0000000040)=[0x6, 0x2b, 0x9, 0x5], 0x4, 0x800, 0x0, 0xffffffffffffffff}) r5 = socket(0x10, 0x3, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'syz_tun\x00', 0x0}) sendmsg$nl_route_sched(r5, &(0x7f00000007c0)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000140)=ANY=[@ANYBLOB="4400000024000b7d0f000000000000000000", @ANYRES32=r6, @ANYBLOB="00000000ffffffff000000000900010063616b650000000014000200"], 0x44}}, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r4, 0x89f0, &(0x7f0000000200)={'syztnl0\x00', &(0x7f0000000180)={'syztnl2\x00', r6, 0x0, 0x3f, 0x0, 0x104e, 0x28, @private1, @mcast1, 0x40, 0x20, 0x6}}) 20:03:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x700}}}, 0xb8}}, 0x0) 20:03:17 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009201000000000", 0x2c, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:17 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c464", 0x3b, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1705.200063][T22652] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x732}}}, 0xb8}}, 0x0) [ 1705.491702][T22655] loop2: detected capacity change from 0 to 178 [ 1705.492629][T22657] loop1: detected capacity change from 0 to 61456 [ 1705.511255][T22656] loop0: detected capacity change from 0 to 61456 [ 1705.582016][T22664] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:17 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x900}}}, 0xb8}}, 0x0) [ 1705.775389][T22657] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1705.856810][T22657] Mount JFS Failure: -5 [ 1705.921310][T22657] jfs_mount failed w/return code = -5 [ 1706.014884][T22655] jfs_mount: dbMount failed w/rc = -5 [ 1706.050910][T22656] jfs_mount: dbMount failed w/rc = -5 [ 1706.060572][T22655] Mount JFS Failure: -5 [ 1706.072455][T22655] jfs_mount failed w/return code = -5 [ 1706.081859][T22656] Mount JFS Failure: -5 [ 1706.093565][T22656] jfs_mount failed w/return code = -5 20:03:18 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003000002000009000000002000000009201000000000", 0x2c, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:18 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c464", 0x3b, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:18 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xa00}}}, 0xb8}}, 0x0) 20:03:18 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000", 0xe, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1706.173022][T22670] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1706.273614][T22673] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1706.540085][T22679] loop1: detected capacity change from 0 to 61456 [ 1706.627458][T22680] loop2: detected capacity change from 0 to 178 [ 1706.718624][T22679] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1706.739088][T22679] Mount JFS Failure: -5 [ 1706.743469][T22679] jfs_mount failed w/return code = -5 [ 1707.042890][T22680] jfs_mount: dbMount failed w/rc = -5 [ 1707.051584][T22680] Mount JFS Failure: -5 [ 1707.057440][T22680] jfs_mount failed w/return code = -5 [ 1707.097889][T22659] ppp0: default qdisc (pfifo_fast) fail, fallback to noqueue [ 1707.169591][T22654] team0: Device ipvlan1 failed to register rx_handler [ 1707.308311][T22693] netlink: 32 bytes leftover after parsing attributes in process `syz-executor.3'. [ 1707.532370][T22654] team0: Device ipvlan1 failed to register rx_handler 20:03:19 executing program 4: openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@nfc_llcp={0x27, 0x1, 0x2, 0x3, 0x69, 0x8, "62e2ae039424f791cc6021a4fa0b3a735eb08266100c064a7db650baca5e8f52adbd1bb7f103ad4f8e6261594817666b15ddc0cfc3df1530b72b5c6271b0ae", 0x1b}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000200)="3d7918eb6438608dfa9c78c055f952fae257df455930d5e1912efd02323b83ef0261007505e5ae1487154d4ae9daa929501d181384fbb24f9dbc8d330403bcaaebd48b3cd1c58cb661c7ecc1b5794d2d1b628c1f9f461fbea20a91064380", 0x5e}, {&(0x7f0000000380)="d6f884dc205b85ef7f3fbf041b0b70e37a55deae47f5ac3b0750e9ee5bcdc1e0129f3328ddcda973e7fdf14a794a6eb751b0da3aed89a6f23ff1b7e6f1c39f2e3ea5fbd1d8cc72b25dcaaa6bdbc3ad52e1eda0f34d0d9656bd96990bc0235d52b6ce9d23093d9f42243eb2e36f3c6dc37defdc7e75a9c8788f7fd3c978827db9bd8cd75084448b80", 0x88}, {&(0x7f0000000440)="08dcbf11d46c0f2a3f2404b30053eaaea003dff34ed9e2d4f811ff383095cabcbf90742192b16d72dcd34a8a1e75b63ed58fc79f17842a2c49aef0b4ee73aed29d5a0f66cc8b2df0c53258883950d2c0a1b54f7906e65251e17c777254b0d32b368b5beb7eeb11fdfb779394f16b732b168a675f3cdca93b5b6e292b33cd7369cadd7011370745fb17a8a7d45973e1d7c1a211194d967de8b3f215e5a364f6f17393e78daf790bbcd81b7c9aaf9ef99c6413d2c39683be", 0xb7}, {&(0x7f0000000500)="e5f2acae3d04da5bab26368a04418bd2d4448512a763afec79279484c7098c8096ae0472d7f50bfc2c14e21be275430ac0d58a05d5a99804e8c973fcd8044e11b3e9cec08c781327fb5d8e2009cb1d9844a31682c69967f8b1b466600008fa68c0d58bf4f0be8c79d08e7913c4c4755bf3ad3bc4bac24e8bf195c68dbca7e63a83ccf02e81bc885346185ae1e2b97ef76b0b6be0765b222cbc70c015a3935bdb0f1858fd30e8f058e0acdc7797", 0xad}, {&(0x7f00000005c0)="40158ab4edf482a6ea996496d675365c048e306a2bc925698449b71b21026b3050ba5a31cfa5a44dcd7372387c4be1c5bd2ee9a7bdcab26bcc613766a902e46642b3a13097fbf4303dd2623bb6dd8265d2de629c60ae16b241ed2623a35e6a126b87fc3db4808489e434fc2e0fe162e758c4c3c4d2ab7fbb5c5da2ea637650812dd1b6555cc650d8be0d27814f0b5210b334bc87f71f23e2739f1a23d712f2d8b7a629c078736ad6c7299b331cdaa4e90af700e02c32742aa604955401f35507fe1793218dfc7eb0d7234448b0e8cdb2fa36d27a769d328bf9b513b5693b1c8f02", 0xe1}, {&(0x7f0000000280)="024b340ad0ffd5e7b9323ec382ec6b0b977f38e13e91dccf3fe2b8608f0f6c42abd0ecd04c2f86bf4c9012c11a70aa5571ad85f6c87d4ad109b34980e62303e6a80159ed099ccde1486bb05be43e2d09036d00b3b49afea028427d394ef77fbc675e7f02e4d34889b88b7e5bd89664", 0x6f}, {&(0x7f00000006c0)="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", 0xfc0}], 0x7, &(0x7f0000001740)=[@mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}, @mark={{0x14, 0x1, 0x24, 0x8101}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x90}, 0x20008000) r2 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x20) connect$l2tp6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x5}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) 20:03:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xe00}}}, 0xb8}}, 0x0) [ 1707.815867][T22704] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:19 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:19 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000", 0xe, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:19 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c464", 0x3b, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:19 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xf00}}}, 0xb8}}, 0x0) [ 1707.930649][T22711] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:19 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x1036}}}, 0xb8}}, 0x0) [ 1708.048350][T22715] loop0: detected capacity change from 0 to 61456 [ 1708.130216][T22719] loop1: detected capacity change from 0 to 61456 [ 1708.235766][T22716] loop2: detected capacity change from 0 to 178 [ 1708.236035][T22715] Currently only 4K block size supported! [ 1708.340838][T22719] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1708.367551][T22715] Mount JFS Failure: -22 [ 1708.419448][T22715] jfs_mount failed w/return code = -22 [ 1708.430231][T22719] Mount JFS Failure: -5 [ 1708.466070][T22719] jfs_mount failed w/return code = -5 [ 1708.493740][T22734] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:20 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000", 0xe, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x1f00}}}, 0xb8}}, 0x0) 20:03:20 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000", 0x59, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:20 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:20 executing program 4: openat$sysfs(0xffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r1, &(0x7f0000000100)=ANY=[], 0x4240a2a0) perf_event_open(&(0x7f0000000300)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$sock(0xffffffffffffffff, &(0x7f0000000080)={&(0x7f0000000100)=@nfc_llcp={0x27, 0x1, 0x2, 0x3, 0x69, 0x8, "62e2ae039424f791cc6021a4fa0b3a735eb08266100c064a7db650baca5e8f52adbd1bb7f103ad4f8e6261594817666b15ddc0cfc3df1530b72b5c6271b0ae", 0x1b}, 0x80, &(0x7f00000016c0)=[{&(0x7f0000000200)="3d7918eb6438608dfa9c78c055f952fae257df455930d5e1912efd02323b83ef0261007505e5ae1487154d4ae9daa929501d181384fbb24f9dbc8d330403bcaaebd48b3cd1c58cb661c7ecc1b5794d2d1b628c1f9f461fbea20a91064380", 0x5e}, {&(0x7f0000000380)="d6f884dc205b85ef7f3fbf041b0b70e37a55deae47f5ac3b0750e9ee5bcdc1e0129f3328ddcda973e7fdf14a794a6eb751b0da3aed89a6f23ff1b7e6f1c39f2e3ea5fbd1d8cc72b25dcaaa6bdbc3ad52e1eda0f34d0d9656bd96990bc0235d52b6ce9d23093d9f42243eb2e36f3c6dc37defdc7e75a9c8788f7fd3c978827db9bd8cd75084448b80", 0x88}, {&(0x7f0000000440)="08dcbf11d46c0f2a3f2404b30053eaaea003dff34ed9e2d4f811ff383095cabcbf90742192b16d72dcd34a8a1e75b63ed58fc79f17842a2c49aef0b4ee73aed29d5a0f66cc8b2df0c53258883950d2c0a1b54f7906e65251e17c777254b0d32b368b5beb7eeb11fdfb779394f16b732b168a675f3cdca93b5b6e292b33cd7369cadd7011370745fb17a8a7d45973e1d7c1a211194d967de8b3f215e5a364f6f17393e78daf790bbcd81b7c9aaf9ef99c6413d2c39683be", 0xb7}, {&(0x7f0000000500)="e5f2acae3d04da5bab26368a04418bd2d4448512a763afec79279484c7098c8096ae0472d7f50bfc2c14e21be275430ac0d58a05d5a99804e8c973fcd8044e11b3e9cec08c781327fb5d8e2009cb1d9844a31682c69967f8b1b466600008fa68c0d58bf4f0be8c79d08e7913c4c4755bf3ad3bc4bac24e8bf195c68dbca7e63a83ccf02e81bc885346185ae1e2b97ef76b0b6be0765b222cbc70c015a3935bdb0f1858fd30e8f058e0acdc7797", 0xad}, {&(0x7f00000005c0)="40158ab4edf482a6ea996496d675365c048e306a2bc925698449b71b21026b3050ba5a31cfa5a44dcd7372387c4be1c5bd2ee9a7bdcab26bcc613766a902e46642b3a13097fbf4303dd2623bb6dd8265d2de629c60ae16b241ed2623a35e6a126b87fc3db4808489e434fc2e0fe162e758c4c3c4d2ab7fbb5c5da2ea637650812dd1b6555cc650d8be0d27814f0b5210b334bc87f71f23e2739f1a23d712f2d8b7a629c078736ad6c7299b331cdaa4e90af700e02c32742aa604955401f35507fe1793218dfc7eb0d7234448b0e8cdb2fa36d27a769d328bf9b513b5693b1c8f02", 0xe1}, {&(0x7f0000000280)="024b340ad0ffd5e7b9323ec382ec6b0b977f38e13e91dccf3fe2b8608f0f6c42abd0ecd04c2f86bf4c9012c11a70aa5571ad85f6c87d4ad109b34980e62303e6a80159ed099ccde1486bb05be43e2d09036d00b3b49afea028427d394ef77fbc675e7f02e4d34889b88b7e5bd89664", 0x6f}, {&(0x7f00000006c0)="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", 0xfc0}], 0x7, &(0x7f0000001740)=[@mark={{0x14, 0x1, 0x24, 0x3}}, @mark={{0x14, 0x1, 0x24, 0x4}}, @timestamping={{0x14, 0x1, 0x25, 0x6}}, @mark={{0x14, 0x1, 0x24, 0x80000001}}, @mark={{0x14, 0x1, 0x24, 0x8101}}, @txtime={{0x18, 0x1, 0x3d, 0x2}}], 0x90}, 0x20008000) r2 = socket$l2tp6(0xa, 0x2, 0x73) bind$l2tp6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x20) connect$l2tp6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @dev, 0x5}, 0x20) splice(r0, 0x0, r2, 0x0, 0x10005, 0x0) [ 1708.817439][T22744] loop0: detected capacity change from 0 to 61456 20:03:20 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x2000}}}, 0xb8}}, 0x0) [ 1708.875438][T22750] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1708.896961][T22716] Mount JFS Failure: -22 [ 1708.901625][T22716] jfs_mount failed w/return code = -22 [ 1708.916513][T22744] Currently only 4K block size supported! 20:03:20 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1709.004034][T22744] Mount JFS Failure: -22 [ 1709.006228][T22755] loop1: detected capacity change from 0 to 61456 [ 1709.030657][T22744] jfs_mount failed w/return code = -22 [ 1709.107239][T22755] jfs_mount: diMount(ipaimap2) failed, rc = -5 20:03:21 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000", 0x13, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1709.153109][T22755] Mount JFS Failure: -5 20:03:21 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1709.186533][T22755] jfs_mount failed w/return code = -5 [ 1709.208104][T22766] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x3207}}}, 0xb8}}, 0x0) 20:03:21 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000", 0x59, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1709.402457][T22776] loop0: detected capacity change from 0 to 61456 [ 1709.431787][T22771] loop2: detected capacity change from 0 to 178 [ 1709.542378][T22776] jfs_mount: Mount Failure: superblock is corrupt! [ 1709.574784][T22776] Mount JFS Failure: -22 20:03:21 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1709.594915][T22776] jfs_mount failed w/return code = -22 [ 1709.603342][T22789] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1709.617300][T22788] loop1: detected capacity change from 0 to 61456 20:03:21 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000", 0x13, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:21 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x3610}}}, 0xb8}}, 0x0) 20:03:21 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r2}}}}]}, 0x38}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) [ 1709.760509][T22788] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1709.768126][T22771] Mount JFS Failure: -22 [ 1709.775884][T22771] jfs_mount failed w/return code = -22 [ 1709.797947][T22788] Mount JFS Failure: -5 20:03:21 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)='J', 0x1, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1709.887075][T22788] jfs_mount failed w/return code = -5 [ 1709.930621][T22802] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1709.944068][T22800] loop0: detected capacity change from 0 to 61456 20:03:22 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000", 0x59, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1710.052852][T22800] jfs_mount: Mount Failure: superblock is corrupt! 20:03:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x4800}}}, 0xb8}}, 0x0) [ 1710.094755][T22800] Mount JFS Failure: -22 [ 1710.125988][T22800] jfs_mount failed w/return code = -22 20:03:22 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1710.169383][T22811] loop2: detected capacity change from 0 to 178 20:03:22 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000", 0x13, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1710.300045][T22811] Mount JFS Failure: -22 [ 1710.306249][T22811] jfs_mount failed w/return code = -22 [ 1710.336327][T22822] loop1: detected capacity change from 0 to 61456 [ 1710.348845][T22824] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x4c00}}}, 0xb8}}, 0x0) [ 1710.431190][T22822] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1710.466543][T22822] Mount JFS Failure: -5 20:03:22 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003", 0x17, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1710.484411][T22822] jfs_mount failed w/return code = -5 20:03:22 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/104, 0x68, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1710.560597][T22830] loop0: detected capacity change from 0 to 61456 20:03:22 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1710.621114][T22844] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:22 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x6000}}}, 0xb8}}, 0x0) [ 1710.841236][T22830] jfs_mount: Mount Failure: superblock is corrupt! [ 1710.884075][T22830] Mount JFS Failure: -22 [ 1710.925093][T22830] jfs_mount failed w/return code = -22 [ 1710.947262][T22850] loop1: detected capacity change from 0 to 61456 [ 1710.950266][T22848] loop2: detected capacity change from 0 to 178 [ 1711.006111][T22856] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x6800}}}, 0xb8}}, 0x0) [ 1711.386805][T22850] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1711.405917][T22850] Mount JFS Failure: -5 [ 1711.409775][T20267] I/O error, dev loop0, sector 61312 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1711.414596][T22850] jfs_mount failed w/return code = -5 [ 1711.511748][T22865] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1711.622297][T22848] jfs_mount: dbMount failed w/rc = -5 [ 1711.656863][T22848] Mount JFS Failure: -5 [ 1711.666599][T22848] jfs_mount failed w/return code = -5 20:03:23 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r2}}}}]}, 0x38}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 20:03:23 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:23 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x6c00}}}, 0xb8}}, 0x0) 20:03:23 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00", 0x16, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:23 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000", 0x5a, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:23 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003", 0x17, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1711.980068][T22891] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:24 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socket$netlink(0x10, 0x3, 0x0) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x7400}}}, 0xb8}}, 0x0) [ 1712.196435][T22895] loop2: detected capacity change from 0 to 178 [ 1712.205948][T22890] loop1: detected capacity change from 0 to 61456 [ 1712.265547][T22893] loop0: detected capacity change from 0 to 61456 [ 1712.290734][T22890] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1712.356504][T22890] Mount JFS Failure: -5 [ 1712.399121][T22890] jfs_mount failed w/return code = -5 20:03:24 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000", 0x5a, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x7a00}}}, 0xb8}}, 0x0) [ 1712.730774][T22895] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1712.730774][T22895] [ 1712.793664][T22895] ERROR: (device loop2): remounting filesystem as read-only [ 1712.808386][T22893] jfs_mount: dbMount failed w/rc = -5 [ 1712.814200][T22893] Mount JFS Failure: -5 [ 1712.826305][T22893] jfs_mount failed w/return code = -5 [ 1712.846392][T22895] xtLookup: xtSearch returned -5 [ 1712.848670][T22917] loop1: detected capacity change from 0 to 61456 [ 1712.854728][T22895] read_mapping_page failed! [ 1712.873563][T22895] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1712.882530][T22895] Mount JFS Failure: -5 20:03:24 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00", 0x16, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1712.896287][T22895] jfs_mount failed w/return code = -5 20:03:24 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xf000}}}, 0xb8}}, 0x0) [ 1712.932713][T22917] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1712.973005][T22917] Mount JFS Failure: -5 [ 1713.001691][T22917] jfs_mount failed w/return code = -5 [ 1713.108529][T22932] loop0: detected capacity change from 0 to 61456 [ 1713.141545][T22932] jfs_mount: dbMount failed w/rc = -5 [ 1713.152079][T22932] Mount JFS Failure: -5 [ 1713.159742][T22932] jfs_mount failed w/return code = -5 20:03:25 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r2}}}}]}, 0x38}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 20:03:25 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003", 0x17, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x34000}}}, 0xb8}}, 0x0) 20:03:25 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000", 0x5a, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:25 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00", 0x16, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:25 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socket$netlink(0x10, 0x3, 0x0) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1713.626317][T22950] __nla_validate_parse: 3 callbacks suppressed [ 1713.626337][T22950] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1713.702616][T22954] loop0: detected capacity change from 0 to 61456 20:03:25 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x400300}}}, 0xb8}}, 0x0) [ 1713.781240][T22952] loop1: detected capacity change from 0 to 61456 [ 1713.861054][T22954] jfs_mount: dbMount failed w/rc = -5 [ 1713.915287][T22954] Mount JFS Failure: -5 [ 1713.921433][T22957] loop2: detected capacity change from 0 to 178 [ 1713.939879][T22954] jfs_mount failed w/return code = -5 [ 1713.996299][T22952] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1714.006018][T22966] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1714.020875][T22952] Mount JFS Failure: -5 [ 1714.032356][T22952] jfs_mount failed w/return code = -5 20:03:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xe0ffff}}}, 0xb8}}, 0x0) 20:03:26 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c0003", 0x17, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:26 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/97, 0x61, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1714.248180][T22974] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:26 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xf0ffff}}}, 0xb8}}, 0x0) [ 1714.375986][T22957] jfs_mount: dbMount failed w/rc = -5 [ 1714.387065][T22976] loop0: detected capacity change from 0 to 61456 [ 1714.411242][T22957] Mount JFS Failure: -5 [ 1714.449348][T22978] loop1: detected capacity change from 0 to 61456 [ 1714.461965][T22957] jfs_mount failed w/return code = -5 [ 1714.499531][T22978] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1714.523305][T22978] Mount JFS Failure: -5 [ 1714.535718][T22985] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:26 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)='JF', 0x2, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1714.570022][T22978] jfs_mount failed w/return code = -5 [ 1714.714594][T22976] jfs_mount: dbMount failed w/rc = -5 [ 1714.727096][T22976] Mount JFS Failure: -5 [ 1714.731631][T22976] jfs_mount failed w/return code = -5 [ 1714.811239][T22992] loop2: detected capacity change from 0 to 178 [ 1714.959236][T22992] Mount JFS Failure: -22 [ 1714.970272][T22992] jfs_mount failed w/return code = -22 20:03:27 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r2}}}}]}, 0x38}}, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) 20:03:27 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socket$netlink(0x10, 0x3, 0x0) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:27 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/97, 0x61, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x1000000}}}, 0xb8}}, 0x0) 20:03:27 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00", 0x16, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:27 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)='JF', 0x2, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1715.263533][T23015] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x2000000}}}, 0xb8}}, 0x0) [ 1715.421506][T23020] loop1: detected capacity change from 0 to 61456 [ 1715.450210][T23017] loop0: detected capacity change from 0 to 61456 [ 1715.463564][T23020] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1715.499187][T23020] Mount JFS Failure: -5 [ 1715.544887][T23020] jfs_mount failed w/return code = -5 [ 1715.575842][T23016] loop2: detected capacity change from 0 to 178 20:03:27 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/97, 0x61, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1715.698173][T23029] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:27 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x3000000}}}, 0xb8}}, 0x0) [ 1715.938767][T23016] Mount JFS Failure: -22 [ 1715.975086][T23016] jfs_mount failed w/return code = -22 [ 1716.004666][T23017] jfs_mount: dbMount failed w/rc = -5 [ 1716.044240][T23017] Mount JFS Failure: -5 20:03:28 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)='JF', 0x2, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1716.075227][T23017] jfs_mount failed w/return code = -5 20:03:28 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:28 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00", 0x16, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1716.203865][T23039] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1716.241428][T23036] loop1: detected capacity change from 0 to 61456 [ 1716.564450][T23036] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1716.576256][T23051] loop0: detected capacity change from 0 to 61456 [ 1716.584383][T23036] Mount JFS Failure: -5 [ 1716.605500][T23036] jfs_mount failed w/return code = -5 [ 1716.681541][T23050] loop2: detected capacity change from 0 to 178 [ 1716.928234][T23050] Mount JFS Failure: -22 [ 1716.948164][T23050] jfs_mount failed w/return code = -22 [ 1717.074815][T23051] jfs_mount: dbMount failed w/rc = -5 [ 1717.086556][T23051] Mount JFS Failure: -5 [ 1717.099936][T23051] jfs_mount failed w/return code = -5 [ 1717.206212][T20272] I/O error, dev loop0, sector 61312 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 20:03:29 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r2}}}}]}, 0x38}}, 0x0) 20:03:29 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x4000000}}}, 0xb8}}, 0x0) 20:03:29 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000", 0x5a, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:29 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000", 0xd, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:29 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:29 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1717.897477][T23083] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1717.930804][T23084] loop0: detected capacity change from 0 to 61456 [ 1717.937007][T23078] loop1: detected capacity change from 0 to 61456 [ 1717.966552][T23079] loop2: detected capacity change from 0 to 178 20:03:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x5000000}}}, 0xb8}}, 0x0) [ 1718.064018][T23084] jfs_mount: dbMount failed w/rc = -5 [ 1718.118688][T23084] Mount JFS Failure: -5 [ 1718.149223][T23084] jfs_mount failed w/return code = -5 20:03:30 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1718.472201][T23095] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1718.610842][T23079] Currently only 4K block size supported! [ 1718.613875][T23078] jfs_mount: diMount(ipaimap2) failed, rc = -5 20:03:30 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x6000000}}}, 0xb8}}, 0x0) [ 1718.653043][T23079] Mount JFS Failure: -22 [ 1718.664149][T23078] Mount JFS Failure: -5 [ 1718.680977][T23079] jfs_mount failed w/return code = -22 [ 1718.684656][T23078] jfs_mount failed w/return code = -5 20:03:30 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:30 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000", 0xd, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:30 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000", 0x5a, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1718.816641][T23102] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1718.857451][T23100] loop0: detected capacity change from 0 to 61456 [ 1719.101083][T23115] loop1: detected capacity change from 0 to 61456 [ 1719.119102][T23100] jfs_mount: dbMount failed w/rc = -5 [ 1719.171036][T23100] Mount JFS Failure: -5 [ 1719.204940][T23116] loop2: detected capacity change from 0 to 178 [ 1719.216351][T23100] jfs_mount failed w/return code = -5 [ 1719.283538][T23115] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1719.328933][T23115] Mount JFS Failure: -5 [ 1719.360081][T23115] jfs_mount failed w/return code = -5 [ 1719.464510][T23116] Currently only 4K block size supported! [ 1719.479246][T23116] Mount JFS Failure: -22 [ 1719.484830][T23116] jfs_mount failed w/return code = -22 20:03:31 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8}}}}]}, 0x38}}, 0x0) 20:03:31 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x7000000}}}, 0xb8}}, 0x0) 20:03:31 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:31 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:31 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000", 0xd, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1719.849741][T23140] loop1: detected capacity change from 0 to 61456 [ 1719.865975][T23141] loop0: detected capacity change from 0 to 61456 [ 1719.900492][T23144] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1719.920624][T23141] jfs_mount: dbMount failed w/rc = -5 [ 1719.935013][T23141] Mount JFS Failure: -5 20:03:31 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1719.957349][T23141] jfs_mount failed w/return code = -5 [ 1719.977387][T23140] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1719.984083][T23140] Mount JFS Failure: -5 20:03:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x8000000}}}, 0xb8}}, 0x0) [ 1720.010299][T23140] jfs_mount failed w/return code = -5 20:03:32 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00", 0x16}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1720.043439][T23142] loop2: detected capacity change from 0 to 178 20:03:32 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1720.165891][T20272] I/O error, dev loop1, sector 61312 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1720.171457][T23158] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x9000000}}}, 0xb8}}, 0x0) 20:03:32 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1720.476689][T23164] loop0: detected capacity change from 0 to 61456 [ 1720.484774][T23167] loop1: detected capacity change from 0 to 61456 [ 1720.579043][T23167] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1720.591323][T23173] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1720.657070][T23167] Mount JFS Failure: -5 [ 1720.670842][T23142] Currently only 4K block size supported! [ 1720.691320][T23164] Mount JFS Failure: -22 [ 1720.695548][T23167] jfs_mount failed w/return code = -5 20:03:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xa000000}}}, 0xb8}}, 0x0) [ 1720.703826][T23142] Mount JFS Failure: -22 [ 1720.709983][T23164] jfs_mount failed w/return code = -22 [ 1720.722757][T23142] jfs_mount failed w/return code = -22 [ 1720.836988][T23178] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:32 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8}}}}]}, 0x38}}, 0x0) 20:03:32 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00", 0x16}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:32 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:32 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:32 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xe000000}}}, 0xb8}}, 0x0) [ 1720.968676][T23193] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1720.979690][T23191] loop1: detected capacity change from 0 to 61456 20:03:33 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xf000000}}}, 0xb8}}, 0x0) [ 1721.089712][T23191] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1721.162039][T23191] Mount JFS Failure: -5 [ 1721.182147][T23192] loop0: detected capacity change from 0 to 61456 [ 1721.197735][T23191] jfs_mount failed w/return code = -5 [ 1721.266729][T23195] loop2: detected capacity change from 0 to 178 [ 1721.307124][T23192] Mount JFS Failure: -22 20:03:33 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000", 0x57, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1721.328583][T23192] jfs_mount failed w/return code = -22 [ 1721.337657][T23209] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:33 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00", 0x16}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x1f000000}}}, 0xb8}}, 0x0) [ 1721.434122][T23195] jfs_mount: Mount Failure: superblock is corrupt! [ 1721.449392][T23195] Mount JFS Failure: -22 [ 1721.457006][T23195] jfs_mount failed w/return code = -22 [ 1721.550075][T23220] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:33 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="db", 0x1}]) 20:03:33 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1721.620666][T23217] loop1: detected capacity change from 0 to 61456 [ 1721.690945][T23226] loop0: detected capacity change from 0 to 61456 [ 1721.746052][T23226] Mount JFS Failure: -22 [ 1721.770516][T23226] jfs_mount failed w/return code = -22 [ 1721.780377][T23217] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1721.793874][T23217] Mount JFS Failure: -5 [ 1721.798587][T23217] jfs_mount failed w/return code = -5 20:03:33 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8}}}}]}, 0x38}}, 0x0) 20:03:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x20000000}}}, 0xb8}}, 0x0) 20:03:33 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00", 0x16, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, 0x0) 20:03:33 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="db", 0x1}]) 20:03:33 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000", 0x57, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1722.000597][T23243] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:34 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) 20:03:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x32070000}}}, 0xb8}}, 0x0) [ 1722.108691][T23234] loop2: detected capacity change from 0 to 178 [ 1722.122357][T23249] loop0: detected capacity change from 0 to 61456 20:03:34 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00", 0x16, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, 0x0) [ 1722.184713][T23256] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x36100000}}}, 0xb8}}, 0x0) [ 1722.320702][T23248] loop1: detected capacity change from 0 to 61456 20:03:34 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="db", 0x1}]) [ 1722.440244][T23234] jfs_mount: Mount Failure: superblock is corrupt! [ 1722.472607][T23234] Mount JFS Failure: -22 20:03:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x48000000}}}, 0xb8}}, 0x0) [ 1722.492649][T23234] jfs_mount failed w/return code = -22 [ 1722.509083][T23248] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1722.580254][T23248] Mount JFS Failure: -5 [ 1722.633158][T23248] jfs_mount failed w/return code = -5 [ 1722.639787][T23268] loop0: detected capacity change from 0 to 61456 20:03:34 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000010", 0x12, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:34 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f", 0x54, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:34 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) 20:03:34 executing program 0: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00", 0x16, 0x8000}, {0x0, 0x0, 0x9000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c464", 0x4b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {0x0}, {&(0x7f0000018900), 0x0, 0xf01000}], 0x0, 0x0) 20:03:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x4c000000}}}, 0xb8}}, 0x0) 20:03:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x60000000}}}, 0xb8}}, 0x0) 20:03:35 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1723.031594][T23295] loop0: detected capacity change from 0 to 61456 [ 1723.040786][T23288] loop1: detected capacity change from 0 to 61456 [ 1723.113619][T23290] loop2: detected capacity change from 0 to 178 20:03:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x68000000}}}, 0xb8}}, 0x0) 20:03:35 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) syz_genetlink_get_family_id$smc(&(0x7f0000000740), r0) [ 1723.266543][T23288] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1723.291645][T23288] Mount JFS Failure: -5 [ 1723.298257][T23288] jfs_mount failed w/return code = -5 20:03:35 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f", 0x54, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:35 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x6c, 0x6c, 0x2, [@enum={0x0, 0x1, 0x0, 0x6, 0x4, [{}]}, @int, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x86}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 20:03:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x6c000000}}}, 0xb8}}, 0x0) [ 1723.434161][T23290] jfs_mount: Mount Failure: superblock is corrupt! [ 1723.455793][T23290] Mount JFS Failure: -22 [ 1723.468268][T23290] jfs_mount failed w/return code = -22 [ 1723.537801][T23323] ptrace attach of "/root/syz-executor.0 exec"[23322] was attempted by "/root/syz-executor.0 exec"[23323] 20:03:35 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:35 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) sendmsg$nl_route_sched(0xffffffffffffffff, 0x0, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) 20:03:35 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:35 executing program 0: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x3, &(0x7f0000000440)=[{&(0x7f0000000200)='a', 0x1}, {&(0x7f0000000300)='7', 0x1, 0x7ab25482}, {&(0x7f0000000a00)="c1a7d229cc0f75fcf813a25dcc7a31f4c8916f91392df40854b7db63efed35863c9db109f5140b5a4da2ecad8f04ca7d0d35412fc5a93a8c10de5c908d6ff86df3e9410ffb94e61c1b36a6345e1064c37ac9de69e80dcfa3dc28533803c111dae80cbbf9312191848f2e9c9b4e00a73a2d3def5a673cc1b662bd14e0357ec7c78f08d72df5b2180d7c2f9265559d7c7dd2ccfdefe980526c4c73555a9a56dd64ef5afeb6cd6749fa8099dba026ecae1b95923787c646add525db969346509354b19a423d68ed3da88d83ac0545b33d8befadce5d9c45c0617e5d1f01ff03dd371acf94db1de9974358c419d52c26512dfa60f1fc027f766964b99026d236729e8ec54c41e41abfee3c881c1a034bede5f199840b44b46dacf88fee5d952ac59f04a73b399390f61c16783f443c873701095422f3b83df3226dda29c77db871f16d3a9d745468bac43a91b214af8d22bd22850053653df018fc5b727dd18d719ca3ad35689dde4a1ca3910e7cadfdc3faecc7d03fe34e41a853a21ded33bc3ff6526738a4c9107823dc105ff6a71ef5038edfc9e13f9a6ced7326ef94035f00263cc6b4a5053e23f61f6d1116d397c0614cc50000f5fc89ba0e33c778fa78bfc941e81eb3d4f3d154e585f113d35e26e132024610d0ab7afef0709b5b006fbee89eb760245e45eb68903273b14017941eea7c09feaa7a1de204ab7cc91c0e003d060f8de6c9ca5d6d192aa594c50edae0b9e44ffc0e49b1e647780fcf62fc33c5b83abf7e65e96bdd78bcbd440107d1f15846dfbaa37a35a597f153f219aa75df162cf3b93c80fa601f3e6e598c77c58d81bcb86917d169dc672bc11296259be364f5aecd62da39e92c9fb93ef702823a2d123f6e9591e79fd47ff5fe6ae28300979dd0c554eea88f4a404facf1fe3a4d2c9396fe4e049d880239a1ed659f8ce9eccfeec47525b688241a5b4ea568237aef1b309cb2d5e2ff1e72a514d8e471a96e08bf3222868119e9abcf1678a2b2ed06314386ef95aa3312f96527919a25b6e9092f3bc2e9b8f72d82d5f1f87ded91b59ba749a5b0b137dbe68c0e081e7c8479e932d765f4749e7cdf4ca2b5cb2a95cf3e97542c779f8249afbeece459628c7afc21b7e94cf23e69f37e54829f87227287985bc3264bea3b98bebd47df3eebc0ed22fca43bbe8d69b0c67f186ad86f400729f639b3e95f1ab0654190ff155353cdfe9d84d6bfa6658345c45e840a8c7ce900f382cf8732791bfc4e68bca286e2694cd3fe8baefd1713c43185a1e38d55ba9189034711156a7307cd6463f0a887c908eb6608c8d81ab44d507a875cae6eed235302663eb3e397972cdb1604c7282583cd7bfdf185912def52129bde5e703e48a281642fd4bc069903d2b89905543fd60c9767b8874472f00d45879db395b3ea6ed52fd72b1d1d17d951f9a32a576a41ad88c8a7d0a4ecfc60a6c980c94a7aea27d3efae83d14458471b75946c7eeef26b47fdcc85083ac2914a0b3a948ec00cf263644be2ae044e7fc4408825dad3abf7a0ae8edc1daf4afed4dcfd2967c9ebcc77c11ec239e679e38e18a8df7fceeef3c097210289bf442b4f6adfcf37a2ca0ce735bc061f7453a7c09149c3c73c6766dceead00ee375ffe553aadfacdc123f04d333146ef6a05dddcfa81faba4874ce0afda83054d9cd944429f0726540331fbcd0e53003dbc7e476166bc1a31dba862e3c506b529dd68e2f5e5132da6793195f629dc605862b5935969c76fb41049c9129f47a140cb38a020d06c598eb3e241034f0bac0e55f56acd2718a83837860948cb7fb45786bbd41747493458806f3826ac8c5424a01d4441772efd109ac0cae5509972fa15ad1e9ce629b9dc174e100f231de7f6e61542c70c1249ebdfbcedb1b5b786583f547fcb2d23ec1821c51a852e669c2aabe531d516076129aa051c1eb5f9aa285892faeb8ad771d16221a6a601a6ab248ab2984b2f659cb595ab459d97326f99ec9d54748b4bc4a5f982b8c27d8e999acf4a6dd94266ee8efbec72b0bc19af6b5ea1e47b469c201e33fae81f35cc2e1b91a5e945a7c444063ddb7f67b774ab449a0256881a2e8aaa4103d56b66fc9864feb3f4bd1e5339b263a92a50e60b4d9c9b8b0fb1923f1308cca08e4a23e5eee1cd918edf2b58d8fa0d7a42dd90c0b6e0d36dade0981e078a6d77ac7d33f9b92dda547d4453b9cb8c95582f174f059f3319d14702375e32e19ab2d71dd29c59ec8a52d8983d3b7db73cd0b49b87975516f7ba7dcca2357d8882cd1fdb24779967d5c4641a0dc2aa8022fa51a4f228b56be0a641d9e1aaaf0fcc274416f6f31dffacca4a443242c660f816a1836e623a475daf634bf47851ad84bbd18a4bb212a481e8d16d06e8f8ff65739da1a03f699e4abc982dabd8e38d3bc35884acdfa8070997836ef93e891efd70045a3f6e68225e46ac87329b4e70a6fc4ecb38196be07f161b7b2446a24120aec2b03b65d00e54d4179f8cbb2f5bf1687c6d654501fdfa694ab7d13de3aa45ad4068cd39238bbb11e42de641acdc2c09375120a10e635f1acf049ca25fd332c05b7183e9238686cd4a5257815034ce2b5e48e3af6df1e8bd2aa0c99712432b63c5765583ed15153a73b8f486ca31998de403a73395bb0c628794d54a7da50e9c05db5ad8df2013a9dbbb53322b2aff6b210e21565d558934f7c8f8debb39d0971c94a079ed23acbb67207dfc2eddbf1825d4915659106ca0666f6e3e54216a627d9741d20a5208f1b3fe80f2f12ab47ff8bc084c5a05737c91ae351d029d9257d21e8e57080099f4731e467b1ffb40a4160600da92f2e4e681cbfcdf50e42bec99d5fd97b3487dd39a96c6e8ec9bd3d961404ed500af58b2bd5a067b4a2b486429288704b060afded49143f15c17952dcc8634fb44b531a4579bf23a57dab7ab60eec5cbe5a875b5a2d933275c90e7083bb26e2c4e123a7b7a58b58133b3ddf87c3454314bf97cf86eccdfecafeef3b9ade95c4465bab6a419af01dd80c7abec5b74c45e147928aa432fb2dcd4db1cbb1949d50406a97480ee3f651eceb0831e827013c0897726c0372f273bb055fcb7a4ff310a6677768553946beba36bbe73b3bd6bf66d50daea6d08a4dbb6e6fe7a4da20edb39e0166d0bb1c12b8324251614ead4bdb83abbc5467348d42cceb4d66ed9019c46a4cae448a5610cec1811e22784783b21e092483286344e8cd5a00d76e598104c35215f30a18fcfd8420f617b117fa8634b6bf0d05932f9f875eea0f8c6083f1bc9f8234ddddfdd1059979987fbf4ad1d930bde3b9a3730aafed6f666a90831bc64ce8130c72fd5688d4fa9b867284e2a92f6421b0713d4dd252c5a55d179563f3652c7a0300ac386e59c34226b128fc020dcaac20ff0beb9acd0d33d7c15d2c17393f7beefd202b007ab782c9d22f88a9d66cee335c0c5438cdbd167661f71c27224517100c6397edbc9b22dfa732e2f8ba1fa3e582b261d3ce992776ae101a179b3628f42531280b5830455a88ade0b5d89f2286ee3ec56729f461446313203417fa38e4f42041dfd65c17b1f42febfe3603214b6918fea9b3037c6c8eac14b8e90f8b7a0b4987fe7481d94b8b7a2624536d54dc1a480ea9cc2082d836dd9bde6b80d9f157645878acdc0bf771d003fb5be6b418458efd8510dbdaf88d6879ff2899d9a28698824c6eb70dc6430cb7a2a38592807a00c714c66a0e9f74c28fd8355a3ac21725e0025994582ece639b6df153768f43166db2c1358ca57666744f1c53436b43a4899614841c203480b8b373936c0e2072e93970fd73a8ab9711ac508d12798c6f48921755805bb976b6b4f7a931e50fd6618729567ab8a3ed8d8e62fcba94035abfdc91935174bb9058aca140682322f27fd9d609c4e2aac81778fee68318d7da29cd99111b62806caa93a01b6d2a57af26a0ab50ab0ac19b9763678c3c6709244eb991ee3f532bf48221678fdf15c7c7b7f6e6195bfa393f18288a242970eed27a50fa2e6e30231161469ac0e70e7e993144c613c99c10363b4fa9a0710a2913507ea33353217b3f878224acc13de76f66dc4d4525664747cf0ab79790aa7c7785e70ade1c269afaf645974360cef1b7ad3eec6820b8b1c01f3aef2531538d141b072b59b54bf04740a40cff0ce6df4d5477057beeada34f47049c87a0df0b77fabd340c84e52d8e404110723e84b7da429a58bdb398f11d6a1ce071ad32914745ba4b6b7d2be09ff09b580e1cba9feef48ce9c46b13d2e8a891ec1c2f65434df2f99159d297123371eee4ed1adf252c13f68aaf887d5a9d93ccd8b82b7a8eef9de23ccd2f533da39352830a72be196bf71d53b864ee63460b1e588f830446efd30f262b73e4a719f5f0c8acaa18aeb33aa4455c72d24344457841d3a5dc2fc07907a1ddc4beccfc357152caebdb2228bd03821f9fe2ce8ff87092af26cd866f6dda5e2691b1e06e6b23780c73aaf28b2152088db6520335d962c67134b7324a2f5a1bf7609289b4bb7b21a43e76e28a992ce2065142b46947683ee6a2937f619ac32e134132b95bf2eb8a2e071be0d28bc12843acf8a8bc66769b4b3455a997dc9c2fb0eb82fb8d8a5b705601f048fff906f0d711f39254ef0cee9c7a5f5e2984091006e4a0938a9b1b25592a4fd72d8763f704027e2e24dfc27cf766a64f6ebf2a4c0b0b42f311518a760a9d3b50f076c739b685d341ca31f54e3e9e7519d84888b1a52d207ebbf3ad5fc0b2a6f6c5c9aa19eb0e1eacbf92f3d74bc582f3d781d4b661bff33eedd7e693aefefc8b566124574de8855963609cfe8f31f5ff71e24ff2c172cbd751b15f0071c4ed943e6553f4ba20cbf0f996f647a27d617d6cdc1b8077bdd963647c7323ad7fb251638ef66de49470c9c404651b93ae678a32093d5f3628cc813cec6b14ff248a02e53ee709537989798965aa821ad8849266ba969f446946f39f02feb9fb19250d57d6c80550699c421ac77a80a2aa8f0564062560a523013bd2f9fc0cfb825aadb3a08a85feb387efdb8e38a2c53836c7d2eabb707cea2f0c6f65f035ba7b1e80920817e7ffa4fd5f5e2d32fc233c2e8296abc132b6e2657331668a046af83e630e64314d1db8ff08264ddfca8e25f6f3e9bf5b03eb8220511ead77e0f22bebae06ce0b843ede1990d2baaf9ebf288cec29389df287a02529ecb5e4a6704e4b61f68e350857afd611e36f09ef84760bdd674d8c7f679ec8e4e6ea5ea3f2ba2b15b7112178f349001ea9ddbd46c88aaf73cb6a30d332a3606cfe36572f066ed18f48358b5dff18f65c7aac7e1a3bccaaf970c09c0e9a045af7e5addeb6f5c5ca0fb3b8c22355976d7bcc02c86fedb34c6f3cb1f1bf65e2f350fe95e91ebf198c1a9f90e82bb1e8d86b823a37e2af8e02bb4876ce9dc6306de2e2c61866aae01808529413fe1c7592eb73e5003b691025b55d2f38c8d381a08ae9b99e89fe14842d7c9d9b9944a974ba623e54267fc95767e818753832bd4c8aa4427238f5ddfd237a4db65f056ab14530e12a6e47997a596e311a178f80d22ae25c30ba3bfa797d63f07153775ae1f05be2032245e56724a97f40da35772e920490cfcaa12a6dd0a71166788d864a8877d9c2a96974ad03968bc78237e788eef58f706c45c51605d4efc27dbcb8fcc3cd9a34e661fc6e427297284dd0caef480ed9adf0df2960e85fc4b4562e65f5548ddcf58033574237eccf3939e02ffbd2f7402575efa005b0fe331fd554d5acb75563b17ccc26a3be23dd", 0x1000, 0x1}], 0x0, 0x0) 20:03:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x74000000}}}, 0xb8}}, 0x0) [ 1723.703705][T23330] loop0: detected capacity change from 0 to 115284 [ 1723.737728][T23321] loop1: detected capacity change from 0 to 61456 20:03:35 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x7a000000}}}, 0xb8}}, 0x0) [ 1723.824965][T23330] loop0: detected capacity change from 0 to 115284 20:03:35 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:35 executing program 0: syz_mount_image$fuse(&(0x7f0000000640), &(0x7f0000000680)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000007c0)) [ 1723.924754][T23321] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1723.949415][T23321] Mount JFS Failure: -5 [ 1723.961101][T23321] jfs_mount failed w/return code = -5 [ 1723.986031][T23351] __nla_validate_parse: 7 callbacks suppressed [ 1723.986052][T23351] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1724.022653][T23347] loop2: detected capacity change from 0 to 178 [ 1724.053645][T23351] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1724.075763][T23359] fuse: Bad value for 'fd' 20:03:36 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f", 0x54, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1724.123363][T23359] fuse: Bad value for 'fd' 20:03:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x80ffffff}}}, 0xb8}}, 0x0) 20:03:36 executing program 0: r0 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000640)={0x1, 0x80, 0x81, 0x0, 0x65, 0x0, 0x0, 0x2, 0x40004, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x2, @perf_config_ext={0x0, 0x424}, 0x9000, 0x7, 0x3ff, 0x8, 0x0, 0x0, 0x2, 0x0, 0x800, 0x0, 0xfffffffffffff800}, 0x0, 0x10, 0xffffffffffffffff, 0x1) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000540)={0x2, 0x80, 0x63, 0x1, 0x0, 0x1f, 0x0, 0x0, 0x4000, 0xc, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3d3a, 0x0, @perf_bp={&(0x7f0000000380), 0x1}, 0x1404, 0x4, 0x9, 0x1, 0x0, 0x5, 0xfffd, 0x0, 0x86, 0x0, 0x8}, 0x0, 0x5, 0xffffffffffffffff, 0x0) sendmsg$IPSET_CMD_PROTOCOL(0xffffffffffffffff, 0x0, 0x0) clone3(&(0x7f0000000400)={0x80000000, &(0x7f00000001c0), &(0x7f0000000200)=0x0, &(0x7f0000000240), {0x1c}, &(0x7f00000002c0)=""/132, 0x84, 0x0, &(0x7f00000003c0)}, 0x58) perf_event_open(&(0x7f0000000140)={0x0, 0x80, 0x0, 0x32, 0xfe, 0x0, 0x0, 0x0, 0x20, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0xfffffff8, 0x5, @perf_bp={&(0x7f0000000000), 0xd}, 0x800, 0x3ff, 0x0, 0x4, 0xe2, 0x0, 0x7ff, 0x0, 0x20, 0x0, 0x1f}, r2, 0xf, r0, 0x0) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) tkill(0x0, 0x40) tkill(0x0, 0x17) perf_event_open(&(0x7f00000005c0)={0x5, 0x80, 0x4, 0x4, 0x3f, 0x2, 0x0, 0x3ff, 0xc00, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff}, 0x2001, 0x3f, 0x400, 0x6, 0x5, 0x3, 0x6, 0x0, 0xfffffff8, 0x0, 0x1}, 0x0, 0x2, r1, 0x2) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x1f, 0xfc, 0x4, 0x83, 0x0, 0x8, 0x20002, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x0, 0x6, 0xffffffff, 0x2, 0x2, 0x0, 0xc5, 0x0, 0xf5d8, 0x0, 0x8000}, 0x0, 0xe, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r3 = perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ptrace$PTRACE_SECCOMP_GET_METADATA(0x420d, 0x0, 0x10, &(0x7f0000000280)) mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, r3, 0x0) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) r5 = ioctl$LOOP_CTL_GET_FREE(r4, 0x4c82) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, r5) [ 1724.245479][T23347] jfs_mount: dbMount failed w/rc = -5 [ 1724.259858][T23347] Mount JFS Failure: -5 [ 1724.277673][T23368] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1724.277917][T23347] jfs_mount failed w/return code = -5 20:03:36 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1724.295649][T23367] loop1: detected capacity change from 0 to 61456 [ 1724.325809][T23367] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1724.348666][T23367] Mount JFS Failure: -5 [ 1724.363961][T23367] jfs_mount failed w/return code = -5 20:03:36 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000", 0x13, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1724.693131][T23384] loop2: detected capacity change from 0 to 178 20:03:36 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r1, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r2}}}}]}, 0x38}}, 0x0) 20:03:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x9effffff}}}, 0xb8}}, 0x0) 20:03:36 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000", 0x56, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1724.816703][T23384] jfs_mount: Mount Failure: superblock is corrupt! [ 1724.825470][T23384] Mount JFS Failure: -22 [ 1724.830087][T23384] jfs_mount failed w/return code = -22 20:03:37 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000", 0x13, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1724.967514][T23394] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:37 executing program 0: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001a00)={[{@gid={'gid', 0x3d, 0xffffffffffffffff}}]}) 20:03:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xf0ffffff}}}, 0xb8}}, 0x0) [ 1725.145869][T23402] loop2: detected capacity change from 0 to 178 [ 1725.158571][T23399] loop1: detected capacity change from 0 to 61456 [ 1725.227043][T23408] tmpfs: Bad value for 'gid' [ 1725.278112][T23408] tmpfs: Bad value for 'gid' [ 1725.302700][T23402] jfs_mount: Mount Failure: superblock is corrupt! [ 1725.309809][T23411] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1725.319846][T23402] Mount JFS Failure: -22 [ 1725.332554][T23402] jfs_mount failed w/return code = -22 20:03:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xffffe000}}}, 0xb8}}, 0x0) 20:03:37 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)) pselect6(0x40, &(0x7f0000000140)={0x8}, 0x0, 0x0, 0x0, 0x0) [ 1725.384143][T23399] jfs_mount: diMount(ipaimap2) failed, rc = -5 20:03:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xfffff000}}}, 0xb8}}, 0x0) [ 1725.430131][T23399] Mount JFS Failure: -5 [ 1725.440006][T23399] jfs_mount failed w/return code = -5 [ 1725.447593][T23413] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:37 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00", 0x55, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1725.609668][T23423] loop1: detected capacity change from 0 to 61456 [ 1725.628722][T23425] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1725.653604][T23423] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1725.672116][T23423] Mount JFS Failure: -5 [ 1725.685473][T23423] jfs_mount failed w/return code = -5 20:03:37 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:37 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000", 0x13, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xffffff7f}}}, 0xb8}}, 0x0) 20:03:37 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00", 0x55, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:37 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) [ 1725.925188][T23440] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1725.944978][T23442] loop1: detected capacity change from 0 to 61456 20:03:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xffffff80}}}, 0xb8}}, 0x0) 20:03:38 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) [ 1726.047736][T23444] loop2: detected capacity change from 0 to 178 [ 1726.056962][T23442] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1726.073758][T23442] Mount JFS Failure: -5 [ 1726.086338][T23442] jfs_mount failed w/return code = -5 20:03:38 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00", 0x55, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:38 executing program 4: shmat(0x0, &(0x7f0000000000/0x4000)=nil, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) [ 1726.277723][T23444] jfs_mount: Mount Failure: superblock is corrupt! [ 1726.312048][T23465] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1726.356533][T23444] Mount JFS Failure: -22 20:03:38 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8992, &(0x7f0000000280)={'syztnl0\x00', 0x0}) [ 1726.379080][T23444] jfs_mount failed w/return code = -22 20:03:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xffffff9e}}}, 0xb8}}, 0x0) 20:03:38 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000", 0x14, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1726.595275][T23483] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1726.622939][T23473] loop1: detected capacity change from 0 to 61456 [ 1726.829135][T23486] loop2: detected capacity change from 0 to 178 [ 1726.837985][T23473] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1726.874213][T23473] Mount JFS Failure: -5 [ 1726.891554][T23473] jfs_mount failed w/return code = -5 20:03:39 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8934, 0x0) 20:03:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) 20:03:39 executing program 3: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xfffffff0}}}, 0xb8}}, 0x0) [ 1726.961440][T23486] jfs_mount: Mount Failure: superblock is corrupt! [ 1726.968237][T23486] Mount JFS Failure: -22 [ 1726.974767][T23486] jfs_mount failed w/return code = -22 20:03:39 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f", 0x54, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:39 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000200), 0x189000, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x5450, 0x0) 20:03:39 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000", 0x14, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) 20:03:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x40030000000000}}}, 0xb8}}, 0x0) 20:03:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) 20:03:39 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) 20:03:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xe0ffff00000000}}}, 0xb8}}, 0x0) 20:03:39 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) 20:03:39 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0166) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fff00102e80a423c7", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x11, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) [ 1727.391747][T23515] loop1: detected capacity change from 0 to 61456 [ 1727.414387][T23517] loop2: detected capacity change from 0 to 178 20:03:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xf0ffffffffffff}}}, 0xb8}}, 0x0) [ 1727.581041][T23515] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1727.629557][T23515] Mount JFS Failure: -5 [ 1727.654561][T23517] jfs_mount: Mount Failure: superblock is corrupt! [ 1727.664165][T23517] Mount JFS Failure: -22 [ 1727.666143][T23515] jfs_mount failed w/return code = -5 [ 1727.669434][T23517] jfs_mount failed w/return code = -22 20:03:40 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:40 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) 20:03:40 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f", 0x54, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:40 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0166) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fff00102e80a423c7", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x11, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) 20:03:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x100000000000000}}}, 0xb8}}, 0x0) 20:03:40 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000000000000100000", 0x14, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1728.824743][T23566] loop1: detected capacity change from 0 to 61456 20:03:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x200000000000000}}}, 0xb8}}, 0x0) 20:03:41 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r0}}}}]}, 0x38}}, 0x0) [ 1728.993849][T23566] jfs_mount: diMount(ipaimap2) failed, rc = -5 20:03:41 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0166) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fff00102e80a423c7", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x11, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) [ 1729.063872][T23566] Mount JFS Failure: -5 [ 1729.069238][T23566] jfs_mount failed w/return code = -5 20:03:41 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f", 0x54, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x300000000000000}}}, 0xb8}}, 0x0) [ 1729.255064][T23573] loop2: detected capacity change from 0 to 178 [ 1729.386621][T23589] __nla_validate_parse: 11 callbacks suppressed [ 1729.386670][T23589] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1729.553302][T23589] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1729.638328][ T1235] ieee802154 phy0 wpan0: encryption failed: -22 [ 1729.645206][ T1235] ieee802154 phy1 wpan1: encryption failed: -22 20:03:42 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r0}}}}]}, 0x38}}, 0x0) [ 1730.084921][T23595] loop1: detected capacity change from 0 to 61456 [ 1730.131305][T23573] jfs_mount: Mount Failure: superblock is corrupt! [ 1730.149510][T23573] Mount JFS Failure: -22 [ 1730.174366][T23598] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1730.193389][T23573] jfs_mount failed w/return code = -22 20:03:42 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:42 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0166) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fff00102e80a423c7", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x11, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) 20:03:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x400000000000000}}}, 0xb8}}, 0x0) 20:03:42 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1730.240013][T23595] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1730.246480][T23595] Mount JFS Failure: -5 [ 1730.263290][T23595] jfs_mount failed w/return code = -5 20:03:42 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:42 executing program 4: socket$netlink(0x10, 0x3, 0x0) r0 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r0}}}}]}, 0x38}}, 0x0) [ 1730.542674][T23608] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1730.574182][T23614] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x500000000000000}}}, 0xb8}}, 0x0) [ 1730.805610][T23626] loop1: detected capacity change from 0 to 61456 [ 1730.917771][T23631] loop2: detected capacity change from 0 to 178 [ 1730.948524][T23626] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1730.960109][T23626] Mount JFS Failure: -5 [ 1730.964828][T23626] jfs_mount failed w/return code = -5 [ 1730.965614][T23631] Mount JFS Failure: -22 20:03:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 20:03:43 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:43 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x4c, 0x4c, 0x2, [@int, @union={0x0, 0x4, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}]}]}}, 0x0, 0x66}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 20:03:43 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1731.024838][T23631] jfs_mount failed w/return code = -22 [ 1731.050297][T23635] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x600000000000000}}}, 0xb8}}, 0x0) [ 1731.214567][T23649] ptrace attach of "/root/syz-executor.0 exec"[23648] was attempted by "/root/syz-executor.0 exec"[23649] [ 1731.231091][T23647] loop1: detected capacity change from 0 to 61456 [ 1731.245661][T23650] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:43 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, 0x0) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 20:03:43 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000200)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0xb0, 0x22, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x8, 0x0}, 0x80, 0x702, 0xffffffff, 0x1000}}) 20:03:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x700000000000000}}}, 0xb8}}, 0x0) [ 1731.325124][T23647] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1731.348211][T23654] loop2: detected capacity change from 0 to 178 [ 1731.407815][T23647] Mount JFS Failure: -5 20:03:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, 0x0, 0x0) 20:03:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000400), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f0000000440)=""/161) [ 1731.445335][T23647] jfs_mount failed w/return code = -5 [ 1731.467743][T23654] Mount JFS Failure: -22 [ 1731.472935][T23654] jfs_mount failed w/return code = -22 20:03:43 executing program 0: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000300)='7', 0x1, 0x7ab25482}, {&(0x7f0000000a00)="c1", 0x1}], 0x0, 0x0) 20:03:43 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:43 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000065600)) [ 1731.590118][T23675] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:43 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 20:03:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x800000000000000}}}, 0xb8}}, 0x0) 20:03:43 executing program 0: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0166) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) r3 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fff00102e80a423c7", @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) [ 1731.803303][T23688] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1731.867214][T23684] loop1: detected capacity change from 0 to 61456 [ 1731.914324][T23693] netlink: 16 bytes leftover after parsing attributes in process `syz-executor.0'. [ 1731.992107][T23687] loop2: detected capacity change from 0 to 178 [ 1732.042832][T23684] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1732.062911][T23684] Mount JFS Failure: -5 [ 1732.074771][T23684] jfs_mount failed w/return code = -5 [ 1732.309821][T23687] Mount JFS Failure: -22 [ 1732.314595][T23687] jfs_mount failed w/return code = -22 20:03:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x900000000000000}}}, 0xb8}}, 0x0) 20:03:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) 20:03:44 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4", 0x52, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:44 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, 0x0) 20:03:44 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xa00000000000000}}}, 0xb8}}, 0x0) 20:03:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, 0x0}, 0x0) [ 1732.556549][T23712] loop1: detected capacity change from 0 to 61456 [ 1732.714963][T23712] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1732.719012][T23714] loop2: detected capacity change from 0 to 178 20:03:44 executing program 0: sched_rr_get_interval(0x0, &(0x7f00000000c0)) fork() clock_gettime(0x7, &(0x7f0000000340)) [ 1732.759547][T23712] Mount JFS Failure: -5 20:03:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xe00000000000000}}}, 0xb8}}, 0x0) [ 1732.790972][T23712] jfs_mount failed w/return code = -5 20:03:44 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 20:03:44 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, 0x0) 20:03:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xf00000000000000}}}, 0xb8}}, 0x0) 20:03:45 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4", 0x52, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:45 executing program 0: syz_genetlink_get_family_id$ieee802154(0x0, 0xffffffffffffffff) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f00000001c0), r0) 20:03:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 20:03:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x1f00000000000000}}}, 0xb8}}, 0x0) [ 1733.262337][T23749] loop1: detected capacity change from 0 to 61456 [ 1733.271893][T23750] loop2: detected capacity change from 0 to 178 20:03:45 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:45 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) clock_gettime(0x0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000240)='./control\x00', 0xa7000be2) open(&(0x7f0000000100)='./control\x00', 0x0, 0x0) 20:03:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={0x0}}, 0x0) 20:03:45 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x5, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {0x0}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, 0x0) 20:03:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x2000000000000000}}}, 0xb8}}, 0x0) [ 1733.529656][T23749] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1733.554438][T23749] Mount JFS Failure: -5 [ 1733.588719][T23749] jfs_mount failed w/return code = -5 20:03:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x3207000000000000}}}, 0xb8}}, 0x0) 20:03:45 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4", 0x52, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) 20:03:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x3610000000000000}}}, 0xb8}}, 0x0) [ 1733.836537][T23775] loop2: detected capacity change from 0 to 178 20:03:45 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) [ 1733.894183][T23788] loop1: detected capacity change from 0 to 61456 20:03:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) [ 1733.964842][T23788] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1734.010040][T23788] Mount JFS Failure: -5 20:03:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x4800000000000000}}}, 0xb8}}, 0x0) [ 1734.038956][T23788] jfs_mount failed w/return code = -5 20:03:46 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:46 executing program 2: openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)={0x591602, 0x0, 0x12}, 0x18) 20:03:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) 20:03:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x4c00000000000000}}}, 0xb8}}, 0x0) 20:03:46 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:46 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) clock_gettime(0x0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000240)='./control\x00', 0xa7000be2) open(&(0x7f0000000100)='./control\x00', 0x0, 0x0) [ 1734.803005][T23818] loop1: detected capacity change from 0 to 61456 [ 1734.809838][T23820] __nla_validate_parse: 9 callbacks suppressed [ 1734.809857][T23820] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:46 executing program 2: r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='silent\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 20:03:46 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) [ 1734.910276][T23818] jfs_mount: dbMount failed w/rc = -5 [ 1734.978225][T23818] Mount JFS Failure: -5 20:03:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x6000000000000000}}}, 0xb8}}, 0x0) [ 1735.015438][T23818] jfs_mount failed w/return code = -5 [ 1735.095484][T23839] devpts: called with bogus options 20:03:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8, 0x1, r1}}}}]}, 0x38}}, 0x0) 20:03:47 executing program 2: r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='silent\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) [ 1735.153480][T23843] devpts: called with bogus options [ 1735.190828][T23844] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) [ 1735.326227][T23854] devpts: called with bogus options 20:03:47 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c9691007") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x6800000000000000}}}, 0xb8}}, 0x0) 20:03:47 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:47 executing program 2: r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='silent\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 20:03:47 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) 20:03:47 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) clock_gettime(0x0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000240)='./control\x00', 0xa7000be2) open(&(0x7f0000000100)='./control\x00', 0x0, 0x0) [ 1735.975114][T23866] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1736.013655][T23869] loop1: detected capacity change from 0 to 61456 20:03:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x20, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}}, 0x20}}, 0x0) [ 1736.050772][T23873] devpts: called with bogus options 20:03:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x6c00000000000000}}}, 0xb8}}, 0x0) 20:03:48 executing program 2: r0 = fsopen(&(0x7f0000000000)='devpts\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000040)='silent\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) [ 1736.101643][T23869] jfs_mount: dbMount failed w/rc = -5 [ 1736.155243][T23869] Mount JFS Failure: -5 [ 1736.178200][T23869] jfs_mount failed w/return code = -5 [ 1736.206877][T23881] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x7400000000000000}}}, 0xb8}}, 0x0) 20:03:48 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:48 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8}}}}]}, 0x38}}, 0x0) [ 1736.283325][T23885] devpts: called with bogus options [ 1736.370026][T23889] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1736.665162][T23892] loop1: detected capacity change from 0 to 61456 [ 1736.832575][T23892] jfs_mount: dbMount failed w/rc = -5 [ 1736.856068][T23892] Mount JFS Failure: -5 [ 1736.867117][T23892] jfs_mount failed w/return code = -5 20:03:49 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c9691007") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:49 executing program 2: openat$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x10d440, 0x0) 20:03:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8}}}}]}, 0x38}}, 0x0) 20:03:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x7a00000000000000}}}, 0xb8}}, 0x0) 20:03:49 executing program 0: r0 = signalfd(0xffffffffffffffff, &(0x7f00000001c0), 0x8) clock_gettime(0x0, 0x0) ppoll(&(0x7f0000000180)=[{r0}], 0x1, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./control\x00', 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000080), 0x0, 0x0) close(r0) r1 = inotify_init1(0x0) fcntl$setstatus(r0, 0x4, 0x43c00) r2 = gettid() fcntl$setown(r0, 0x8, r2) rt_sigprocmask(0x0, &(0x7f0000000000)={[0xfffffffffffffffd]}, 0x0, 0x8) fcntl$setsig(r1, 0xa, 0x21) inotify_add_watch(r1, &(0x7f0000000240)='./control\x00', 0xa7000be2) open(&(0x7f0000000100)='./control\x00', 0x0, 0x0) 20:03:49 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1737.243164][T23907] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:49 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$ppp(0xffffffffffffff9c, &(0x7f0000000240), 0x0, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f00000002c0)=@newlink={0x38, 0x10, 0xffffff1f, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x3}, [@IFLA_LINKINFO={0x18, 0x12, 0x0, 0x1, @ppp={{0x8}, {0xc, 0x2, 0x0, 0x1, {0x8}}}}]}, 0x38}}, 0x0) [ 1737.289301][ T25] audit: type=1800 audit(1638993829.317:112): pid=23909 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=15393 res=0 errno=0 20:03:49 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f000000a440)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}], 0x20}}], 0x2, 0x0) 20:03:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x80ffffff00000000}}}, 0xb8}}, 0x0) [ 1737.470572][ T25] audit: type=1800 audit(1638993829.337:113): pid=23909 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="file0" dev="sda1" ino=15393 res=0 errno=0 [ 1737.480094][T23911] loop1: detected capacity change from 0 to 61456 [ 1737.601762][T23922] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:49 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0xa, 0x0, &(0x7f0000000080)) 20:03:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x9effffff00000000}}}, 0xb8}}, 0x0) 20:03:49 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000080)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0xb, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0x9}, {}]}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61]}}, &(0x7f0000000200)=""/243, 0x3f, 0xf3, 0x1}, 0x20) [ 1737.907263][T23911] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1737.907263][T23911] [ 1737.959662][T23929] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1737.996516][T23911] ERROR: (device loop1): remounting filesystem as read-only [ 1738.084177][T23911] xtLookup: xtSearch returned -5 [ 1738.114621][T23911] read_mapping_page failed! [ 1738.130418][T23911] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1738.172419][T23911] Mount JFS Failure: -5 [ 1738.188552][T23911] jfs_mount failed w/return code = -5 20:03:50 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c9691007") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:50 executing program 2: r0 = socket(0x18, 0x0, 0x1) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000080)) 20:03:50 executing program 4: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='attr/fscreate\x00') write$FUSE_ENTRY(r0, &(0x7f0000002100)={0x90}, 0x90) 20:03:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xf0ffffff00000000}}}, 0xb8}}, 0x0) 20:03:50 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x300000f, 0x100010, r0, 0x8000000) 20:03:50 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:50 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000006c0)={0x19, 0x3, &(0x7f0000000540)=@framed, &(0x7f00000005c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:03:50 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000100), &(0x7f0000000140)='./file0\x00', 0x0, 0x2, &(0x7f0000000440)=[{&(0x7f0000000200)='a', 0x1}, {&(0x7f0000000300)='7', 0x1, 0x7ab25482}], 0x0, &(0x7f0000001a00)={[{@size={'size', 0x3d, [0x35, 0x0]}}]}) 20:03:50 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r0, 0x11, 0xb, &(0x7f0000000040), 0x4) [ 1738.457139][T23943] loop1: detected capacity change from 0 to 61456 [ 1738.460032][T23945] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xffffff7f00000000}}}, 0xb8}}, 0x0) [ 1738.534165][T23943] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1738.534165][T23943] [ 1738.599704][T23943] ERROR: (device loop1): remounting filesystem as read-only [ 1738.638938][T23957] loop4: detected capacity change from 0 to 115284 20:03:50 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) read$FUSE(r0, 0x0, 0x0) [ 1738.657106][T23943] xtLookup: xtSearch returned -5 20:03:50 executing program 0: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f00000009c0), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x541b, 0x0) [ 1738.695917][T23943] read_mapping_page failed! [ 1738.720467][T23943] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1738.739820][T23962] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1738.750985][T23943] Mount JFS Failure: -5 [ 1738.765056][T23957] loop4: detected capacity change from 0 to 115284 [ 1738.768211][T23943] jfs_mount failed w/return code = -5 20:03:51 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:51 executing program 4: syz_mount_image$fuse(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {'group_id', 0x3d, 0xffffffffffffffff}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'system_u'}}]}}) 20:03:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0xfffffffffffff000}}}, 0xb8}}, 0x0) 20:03:51 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:51 executing program 0: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000100), 0x44500, 0x0) 20:03:51 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x3, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:03:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCGET6RD(r0, 0x89f8, &(0x7f0000000f40)={'sit0\x00', 0x0}) 20:03:51 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x891c, &(0x7f0000000280)={'syztnl0\x00', 0x0}) [ 1739.650673][T23991] fuse: Bad value for 'fd' 20:03:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x2}}}, 0xb8}}, 0x0) [ 1739.704605][T23991] fuse: Bad value for 'fd' [ 1739.742686][T23988] loop1: detected capacity change from 0 to 61456 20:03:51 executing program 4: syz_mount_image$fuse(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000020, &(0x7f0000000200)) 20:03:51 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000004a00), 0x2, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002240)={{'fd', 0x3d, r0}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}}) [ 1739.951476][T24003] __nla_validate_parse: 1 callbacks suppressed [ 1739.951495][T24003] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x3}}}, 0xb8}}, 0x0) [ 1740.300646][T24008] fuse: Invalid rootmode [ 1740.318087][T23988] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1740.318087][T23988] [ 1740.333579][T23988] ERROR: (device loop1): remounting filesystem as read-only [ 1740.333619][T23988] xtLookup: xtSearch returned -5 [ 1740.333655][T23988] read_mapping_page failed! [ 1740.334222][T23988] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1740.340486][T23988] Mount JFS Failure: -5 [ 1740.340523][T23988] jfs_mount failed w/return code = -5 [ 1740.426226][T24010] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:52 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:52 executing program 0: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000013c0)) mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0) 20:03:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x2c, 0x2c, 0x2, [@func_proto={0x0, 0x4, 0x0, 0xd, 0x0, [{}, {}, {0xe}, {}]}]}}, &(0x7f0000000200)=""/243, 0x46, 0xf3, 0x1}, 0x20) 20:03:52 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {0x0, 0x0, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:52 executing program 2: openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0xb6a81951c98d8c73, 0x0) 20:03:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x4}}}, 0xb8}}, 0x0) 20:03:52 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$PPPIOCSACTIVE(r0, 0x5451, 0x0) [ 1740.776311][T24022] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x5}}}, 0xb8}}, 0x0) 20:03:52 executing program 2: fork() sched_rr_get_interval(0x0, &(0x7f00000000c0)) fork() clock_gettime(0x0, &(0x7f0000000340)) fork() [ 1740.887870][T24026] loop1: detected capacity change from 0 to 61456 20:03:53 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000080)={'gre0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 20:03:53 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000380)={0x0, 0x0, 0x0}, 0x2) [ 1740.971520][T24026] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1740.971520][T24026] 20:03:53 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000049c0)=0x3, 0x4) [ 1741.046128][T24026] ERROR: (device loop1): remounting filesystem as read-only [ 1741.066702][T24026] xtLookup: xtSearch returned -5 [ 1741.091760][T24026] read_mapping_page failed! [ 1741.103363][T24026] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1741.114186][T24041] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1741.126771][T24026] Mount JFS Failure: -5 [ 1741.138374][T24026] jfs_mount failed w/return code = -5 20:03:53 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {0x0, 0x0, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x6}}}, 0xb8}}, 0x0) 20:03:53 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000140)={0x18, 0x8, &(0x7f0000000000)=@framed={{}, [@generic, @map, @btf_id]}, &(0x7f0000001600)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:03:53 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:53 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000400)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000440)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x64, 0x64, 0x2, [@enum, @int, @union={0x0, 0x5, 0x0, 0x5, 0x0, 0x0, [{}, {}, {}, {}, {}]}]}}, 0x0, 0x7e}, 0x20) clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f0000000100)=[{&(0x7f0000000000)="0f34", 0x2}], 0x1, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) process_vm_writev(0x0, &(0x7f0000000080)=[{0x0}, {0x0}, {&(0x7f00000193c0)=""/102389, 0x18ff5}], 0x0, 0x0, 0x0, 0x0) tkill(r0, 0x40) wait4(0x0, 0x0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = gettid() rt_sigqueueinfo(r1, 0x3c, &(0x7f0000000040)) 20:03:53 executing program 0: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f00000015c0)={0x0, 0x3, 0x0, [0xffffffffffff658c, 0x0, 0x0, 0x80000000, 0xa7df], [0x9fa6, 0x9, 0xffffffff, 0x0, 0x0, 0x8, 0x0, 0x4, 0xffff, 0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x508, 0x2, 0x0, 0x1, 0x0, 0xffffffffffffffe4, 0x8b, 0xfffffffffffffffe, 0xe8, 0x0, 0x0, 0x4, 0x0, 0x1, 0x100, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x10000, 0x0, 0x0, 0x7, 0x0, 0x8295, 0x0, 0x0, 0x4e29, 0x1ff, 0x9, 0x0, 0x0, 0x0, 0x20, 0xdcc, 0xb2, 0x0, 0x0, 0x0, 0x5, 0x8569, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5845, 0x1, 0x0, 0x0, 0x0, 0x1, 0x4, 0x1, 0x0, 0x8, 0x8, 0x100000000, 0xf3f, 0x0, 0x0, 0x1, 0x6, 0x9, 0x2d, 0x0, 0x6, 0x0, 0x5, 0x3, 0x2, 0x0, 0x0, 0xffff, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0xb4, 0x0, 0xffffffff80000001, 0x7ff, 0x9, 0x1, 0x0, 0xfff, 0x9, 0xff, 0x1, 0x0, 0x401, 0x8, 0x2, 0x0, 0xfffffffffffffffe, 0x9, 0x6, 0x4, 0x0, 0x3]}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000300)={0x50202000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1741.912032][T24063] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x7}}}, 0xb8}}, 0x0) 20:03:54 executing program 4: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000004a00), 0x2, 0x0) write$FUSE_STATFS(r0, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000002c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000004c0)={{r0}, r1, 0x0, @unused=[0x1000, 0x2, 0x2, 0xffffffff], @subvolid=0x3}) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(0xffffffffffffffff, 0x89f7, &(0x7f0000000080)={'ip6tnl0\x00', &(0x7f0000000000)={'sit0\x00', 0x0, 0x2f, 0x8, 0xff, 0xed04, 0x41, @remote, @private0={0xfc, 0x0, '\x00', 0x1}, 0x1, 0x8, 0x7, 0x6}}) socket$inet_udp(0x2, 0x2, 0x0) r3 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_vcan(r3, 0x8933, 0x0) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_int(r3, 0x11, 0x66, &(0x7f00000000c0)=0x6, 0x4) ioctl$ifreq_SIOCGIFINDEX_vcan(r4, 0x8933, 0x0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r5, 0x11, 0x64, &(0x7f0000001c40)=0x5, 0x4) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(r5, 0x89f1, &(0x7f0000000180)={'ip6tnl0\x00', &(0x7f0000000100)={'syztnl2\x00', r2, 0x29, 0x3f, 0x1d, 0x6, 0x22, @local, @local, 0x1, 0x80, 0x2, 0x10001}}) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r4, 0x8903, &(0x7f0000000280)={'gretap0\x00', 0x0}) [ 1742.052430][T24068] loop1: detected capacity change from 0 to 61456 20:03:54 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000100)={'ip_vti0\x00', &(0x7f0000000000)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) [ 1742.158681][T24068] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1742.158681][T24068] [ 1742.173226][T24076] ptrace attach of "/root/syz-executor.2 exec"[24073] was attempted by "/root/syz-executor.2 exec"[24076] [ 1742.242982][T24068] ERROR: (device loop1): remounting filesystem as read-only [ 1742.243434][T24080] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1742.311338][T24068] xtLookup: xtSearch returned -5 20:03:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x8}}}, 0xb8}}, 0x0) [ 1742.348966][T24068] read_mapping_page failed! [ 1742.413229][T24068] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1742.476755][T24068] Mount JFS Failure: -5 [ 1742.531008][T24068] jfs_mount failed w/return code = -5 20:03:54 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)=0xffffffffffff0166) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x3, &(0x7f0000001380)=[{0x0}, {&(0x7f00000012c0), 0x7ffffffffffff, 0x4}, {&(0x7f0000000080)="09918cf1fc988d581e67181b55be575c3623d55e0ec9", 0x16}], 0x840f9, 0x0) r3 = inotify_init1(0x0) fcntl$getownex(r3, 0x10, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) unshare(0x0) 20:03:54 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {0x0, 0x0, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:54 executing program 2: syz_mount_image$fuse(&(0x7f0000000000), 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB, @ANYRESDEC=0xee00, @ANYRESDEC=0x0, @ANYBLOB]) syz_mount_image$fuse(&(0x7f000000fac0), &(0x7f000000fb00)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000000fb40)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee01}, 0x2c, {'group_id', 0x3d, 0xee00}, 0x2c, {[], [{@context={'context', 0x3d, 'root'}}, {@fscontext={'fscontext', 0x3d, 'user_u'}}]}}) open$dir(&(0x7f0000004b40)='./file0\x00', 0x200000, 0x4) syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6, 0x0, 0x0, 0x400, 0x0) r0 = getuid() geteuid() syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x6, 0x5, &(0x7f00000048c0)=[{&(0x7f0000002440)="e7e38cfb9643aaf9612fc9a03cbc1a1161faa8e3873e7b59c0e24414dab0c3208eebb90160fbc56c910958fb8a1bcf1b9de85e1beda38941a57d02102708387d6dadb7f02e6183fede9dad9e6dcfa52b3420c6bc0ccff758a322384f6af26afccea9b6345ce67b9c55", 0x69, 0x100000001}, {&(0x7f0000004940)="dc82f89cd5cafb1c64fc72babf2eaf1141e64bcdc23d653e9b50d16ddbe5c69b71a33bd2bfa6455f1b710644ba8993842c0e00000000ffffffff8094d2ffcc1817d9805db4babc4e1ae46b639fa5847883e88c9641398823213d27c9d5923315b0a3bd98e97a2308424bcc8052fc86e4dbd2a96cf10b16ee1cdbb3124b9c6834e755ca2449bb26dbfa492925f4adcaad5897a60ec184c7326702e94a143dbbdba58a40b480727bb0cd777628d8cffdb45eb88d81da732bc1b40e2a3df94c44084e932397cfe2b9e158b36b5c261c06006bdfdd8e1a73d3ce00"/226, 0xe2, 0xebbc}, {&(0x7f00000046c0)="b8a8264f99c0b789365748a1ff8b3754d2", 0x11, 0x64}, {&(0x7f0000004700)="bc947470109d3309aa6a5cf6f2fa4ac85f174916617da11cc44c0e262f876a7c4495b3f9534b4e63b8fbfc332cb27690df099121a69bf0d39f352af8ee689453714e15eba414350de30dd3ac534d0d9cba091ff45bce6406ceaf801046e30e4ea18903afd00d2bdfb529a10fec13337b3436bd4a779779f91326ee9239302b256fc6961b6bfd8d7c7396488046d68c6a0ef08430e47d805f287b126fa69e62ae899f0ad52a93bf64214805eab06f66147f1820", 0xffffffffffffff10}, {&(0x7f00000047c0)="11dd80b998314cda75e522a942f192b08c672cc1e29e114821be01257cf98497b8ac3d90cfb88f5201f03c394c85879e430f4339deb725203fff8f676b3da74f349eb25079c8703f9888f0c827a28c5df0604be5dc945598a4612c00a56ce150e0d0e5405e3f8aecd708876ef733d05e8d00f392d2ff96cbb53a23b33306941ed27830aa35ab4d11710c9c899d7198081c0d84e9ffd7fe6bb045b54451f128f46fce5536d44c1814c901386fa914caee3e6bc948430a140e1a0c08cc9746aed0c68a6d0801d60575db3b4c88be823291949b492a5e8d", 0xd6, 0x7}], 0x400, &(0x7f0000004540)={[{@huge_never}, {}, {}, {@huge_always}, {@mode={'mode', 0x3d, 0xc51}}], [{@smackfsroot={'smackfsroot', 0x3d, '(&!*})+*#}^@/,%'}}, {@uid_gt}, {@euid_eq}, {@uid_gt={'uid>', r0}}, {@defcontext={'defcontext', 0x3d, 'system_u'}}]}) read$FUSE(0xffffffffffffffff, &(0x7f0000000300)={0x2020}, 0x2020) getgroups(0x1, &(0x7f0000002340)=[0x0]) fsmount(0xffffffffffffffff, 0x0, 0x0) sendmsg$DEVLINK_CMD_TRAP_POLICER_GET(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) getgroups(0x0, 0x0) mount$fuse(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)={{}, 0x2c, {}, 0x2c, {}, 0x2c, {}, 0x2c, {[{@blksize}], [{@obj_role}]}}) [ 1742.761830][T24089] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x9}}}, 0xb8}}, 0x0) [ 1743.449964][T24099] fuse: Bad value for 'fd' [ 1743.455602][T24100] loop1: detected capacity change from 0 to 61456 [ 1743.476542][T24102] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:55 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f000000a440)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1400000000000000010000000100000025d4"], 0x18}}], 0x2, 0x0) 20:03:55 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e899") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:03:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) [ 1743.722386][T24100] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1743.722386][T24100] [ 1743.765719][T24113] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1743.783180][T24100] ERROR: (device loop1): remounting filesystem as read-only [ 1743.850836][T24100] xtLookup: xtSearch returned -5 [ 1743.889436][T24100] read_mapping_page failed! [ 1743.940066][T24100] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1743.980729][T24100] Mount JFS Failure: -5 [ 1744.002324][T24100] jfs_mount failed w/return code = -5 [ 1744.186050][T24104] loop2: detected capacity change from 0 to 264192 [ 1744.222318][T24104] tmpfs: Unknown parameter 'smackfsroot' [ 1744.270601][T24099] fuse: Bad value for 'fd' 20:03:58 executing program 0: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f00000015c0)={0x0, 0x3, 0x0, [0xffffffffffff658c, 0x0, 0x0, 0x80000000, 0xa7df], [0x9fa6, 0x9, 0xffffffff, 0x0, 0x0, 0x8, 0x0, 0x4, 0xffff, 0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x508, 0x2, 0x0, 0x1, 0x0, 0xffffffffffffffe4, 0x8b, 0xfffffffffffffffe, 0xe8, 0x0, 0x0, 0x4, 0x0, 0x1, 0x100, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x10000, 0x0, 0x0, 0x7, 0x0, 0x8295, 0x0, 0x0, 0x4e29, 0x1ff, 0x9, 0x0, 0x0, 0x0, 0x20, 0xdcc, 0xb2, 0x0, 0x0, 0x0, 0x5, 0x8569, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5845, 0x1, 0x0, 0x0, 0x0, 0x1, 0x4, 0x1, 0x0, 0x8, 0x8, 0x100000000, 0xf3f, 0x0, 0x0, 0x1, 0x6, 0x9, 0x2d, 0x0, 0x6, 0x0, 0x5, 0x3, 0x2, 0x0, 0x0, 0xffff, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0xb4, 0x0, 0xffffffff80000001, 0x7ff, 0x9, 0x1, 0x0, 0xfff, 0x9, 0xff, 0x1, 0x0, 0x401, 0x8, 0x2, 0x0, 0xfffffffffffffffe, 0x9, 0x6, 0x4, 0x0, 0x3]}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000300)={0x50202000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 20:03:58 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f000000a440)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000180)=ANY=[@ANYBLOB="1400000000000000010000000100000025"], 0x18}}], 0x2, 0x0) 20:03:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xe}}}, 0xb8}}, 0x0) 20:03:58 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000), 0x0, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:03:58 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8911, &(0x7f0000000280)={'syztnl0\x00', 0x0}) 20:03:58 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e899") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1746.087242][T24166] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:03:58 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fff00102e80a423c7", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x11, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) 20:03:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xf}}}, 0xb8}}, 0x0) 20:03:58 executing program 2: r0 = syz_open_dev$evdev(&(0x7f0000000100), 0x0, 0x2) write$binfmt_aout(r0, 0x0, 0x0) [ 1746.160482][T24172] loop1: detected capacity change from 0 to 61456 [ 1746.259354][T24172] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1746.259354][T24172] [ 1746.302567][T24172] ERROR: (device loop1): remounting filesystem as read-only [ 1746.353930][T24172] xtLookup: xtSearch returned -5 [ 1746.391629][T24181] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1746.441627][T24181] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1746.699979][T24172] read_mapping_page failed! [ 1746.949385][T24172] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1747.090449][T24172] Mount JFS Failure: -5 20:03:59 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fff00102e80a423c7", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x11, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) [ 1747.115828][T24177] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1747.131749][T24177] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 20:03:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x48}}}, 0xb8}}, 0x0) [ 1747.192470][T24172] jfs_mount failed w/return code = -5 20:03:59 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e899") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1747.471733][T24195] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1748.118994][T24200] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 20:04:02 executing program 0: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f00000015c0)={0x0, 0x3, 0x0, [0xffffffffffff658c, 0x0, 0x0, 0x80000000, 0xa7df], [0x9fa6, 0x9, 0xffffffff, 0x0, 0x0, 0x8, 0x0, 0x4, 0xffff, 0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x508, 0x2, 0x0, 0x1, 0x0, 0xffffffffffffffe4, 0x8b, 0xfffffffffffffffe, 0xe8, 0x0, 0x0, 0x4, 0x0, 0x1, 0x100, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x10000, 0x0, 0x0, 0x7, 0x0, 0x8295, 0x0, 0x0, 0x4e29, 0x1ff, 0x9, 0x0, 0x0, 0x0, 0x20, 0xdcc, 0xb2, 0x0, 0x0, 0x0, 0x5, 0x8569, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5845, 0x1, 0x0, 0x0, 0x0, 0x1, 0x4, 0x1, 0x0, 0x8, 0x8, 0x100000000, 0xf3f, 0x0, 0x0, 0x1, 0x6, 0x9, 0x2d, 0x0, 0x6, 0x0, 0x5, 0x3, 0x2, 0x0, 0x0, 0xffff, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0xb4, 0x0, 0xffffffff80000001, 0x7ff, 0x9, 0x1, 0x0, 0xfff, 0x9, 0xff, 0x1, 0x0, 0x401, 0x8, 0x2, 0x0, 0xfffffffffffffffe, 0x9, 0x6, 0x4, 0x0, 0x3]}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000300)={0x50202000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 20:04:02 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000), 0x0, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:02 executing program 2: connect$unix(0xffffffffffffffff, 0x0, 0x0) sendmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x2, 0x0) creat(&(0x7f0000000280)='./bus\x00', 0x0) r0 = socket(0x10, 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r2, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r1, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fff00102e80a423c7", @ANYRES32=r3, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x24, 0x11, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r3, {}, {0xffff}}}, 0x24}}, 0x0) 20:04:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x4c}}}, 0xb8}}, 0x0) 20:04:02 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fff00102e80a423c7", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x11, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) 20:04:02 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1750.338881][T24246] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1750.462222][T24250] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1750.592343][T24250] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 20:04:03 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setaffinity(0x0, 0x8, &(0x7f0000000040)) sched_setattr(0x0, &(0x7f0000000140)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f00000000c0)={0x38, 0x2, 0x0, 0x0, 0x5}, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) connect$unix(r1, &(0x7f000057eff8)=@abs, 0x6e) sendmmsg$unix(r2, &(0x7f00000bd000), 0x318, 0x0) recvmmsg(r1, &(0x7f00000000c0), 0x10106, 0x2, 0x0) r3 = socket(0x10, 0x2, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x10, 0x803, 0x0) sendmsg$BATADV_CMD_GET_MESH(r5, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000480)={0x0}}, 0x0) getsockname$packet(r5, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) sendmsg$nl_route(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000040)=ANY=[@ANYBLOB="3c0000001000010400eeff7fff00102e80a423c7", @ANYRES32=r6, @ANYBLOB="01000000010000001c0012000c000100627269646765"], 0x3c}}, 0x0) sendmsg$nl_route_sched(r3, &(0x7f0000005840)={0x0, 0x0, &(0x7f0000000780)={&(0x7f0000000500)=@newqdisc={0x38, 0x11, 0xe0b, 0x0, 0x0, {0x0, 0x0, 0x0, r6, {}, {0xffff}}, [@qdisc_kind_options=@q_fq_codel={{0xd}, {0x4}}]}, 0x38}}, 0x0) 20:04:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x60}}}, 0xb8}}, 0x0) 20:04:03 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000), 0x0, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1751.371321][T24248] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.2'. [ 1751.382890][T24263] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1751.470628][T24254] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.2'. 20:04:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x68}}}, 0xb8}}, 0x0) 20:04:03 executing program 2: r0 = socket$can_raw(0x1d, 0x3, 0x1) setsockopt$CAN_RAW_RECV_OWN_MSGS(r0, 0x65, 0x4, &(0x7f00000004c0), 0x4) [ 1751.556684][T24266] loop1: detected capacity change from 0 to 61456 [ 1751.654862][T24272] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 1751.785176][T24272] netlink: 24 bytes leftover after parsing attributes in process `syz-executor.4'. 20:04:04 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1752.481348][T24266] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1752.481348][T24266] [ 1752.572689][T24266] ERROR: (device loop1): remounting filesystem as read-only [ 1752.636374][T24266] xtLookup: xtSearch returned -5 [ 1752.641898][T24266] read_mapping_page failed! [ 1752.649622][T24266] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1752.713013][T24266] Mount JFS Failure: -5 [ 1752.739120][T24266] jfs_mount failed w/return code = -5 20:04:33 executing program 0: perf_event_open(&(0x7f00000003c0)={0x0, 0x80, 0xd7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000040)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000004c0)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f00000015c0)={0x0, 0x3, 0x0, [0xffffffffffff658c, 0x0, 0x0, 0x80000000, 0xa7df], [0x9fa6, 0x9, 0xffffffff, 0x0, 0x0, 0x8, 0x0, 0x4, 0xffff, 0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x508, 0x2, 0x0, 0x1, 0x0, 0xffffffffffffffe4, 0x8b, 0xfffffffffffffffe, 0xe8, 0x0, 0x0, 0x4, 0x0, 0x1, 0x100, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x10000, 0x0, 0x0, 0x7, 0x0, 0x8295, 0x0, 0x0, 0x4e29, 0x1ff, 0x9, 0x0, 0x0, 0x0, 0x20, 0xdcc, 0xb2, 0x0, 0x0, 0x0, 0x5, 0x8569, 0x0, 0x0, 0x0, 0x0, 0x4, 0x5845, 0x1, 0x0, 0x0, 0x0, 0x1, 0x4, 0x1, 0x0, 0x8, 0x8, 0x100000000, 0xf3f, 0x0, 0x0, 0x1, 0x6, 0x9, 0x2d, 0x0, 0x6, 0x0, 0x5, 0x3, 0x2, 0x0, 0x0, 0xffff, 0x8, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffff, 0x0, 0xb4, 0x0, 0xffffffff80000001, 0x7ff, 0x9, 0x1, 0x0, 0xfff, 0x9, 0xff, 0x1, 0x0, 0x401, 0x8, 0x2, 0x0, 0xfffffffffffffffe, 0x9, 0x6, 0x4, 0x0, 0x3]}) perf_event_open(&(0x7f00000003c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000300)={0x50202000, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 20:04:33 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0xb, 0x0, &(0x7f0000000540)) 20:04:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x6c}}}, 0xb8}}, 0x0) 20:04:33 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) getpeername(r0, &(0x7f0000000400)=@qipcrtr, &(0x7f0000000980)=0xfffffec3) 20:04:33 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200"/32, 0x20, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:33 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:33 executing program 2: r0 = socket$can_bcm(0x1d, 0x2, 0x2) recvmsg$can_bcm(r0, &(0x7f0000000180)={&(0x7f0000000000)=@llc={0x1a, 0x0, 0x0, 0x0, 0x0, 0x0, @link_local}, 0x80, 0x0}, 0x0) 20:04:33 executing program 4: socket(0x20, 0x0, 0x0) [ 1781.742305][T24329] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:33 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x74}}}, 0xb8}}, 0x0) [ 1781.878464][T24330] loop1: detected capacity change from 0 to 61456 20:04:34 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmmsg$unix(r0, &(0x7f000000a440)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000002700)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @rights={{0x10}}], 0x28}}], 0x300, 0xfe) [ 1782.053272][T24344] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1782.090122][T24330] read_mapping_page failed! [ 1782.116126][T24330] jfs_mount: diMount(ipaimap) failed w/rc = -5 20:04:34 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x7a}}}, 0xb8}}, 0x0) [ 1782.165136][T24330] Mount JFS Failure: -5 [ 1782.203954][T24330] jfs_mount failed w/return code = -5 20:04:34 executing program 4: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x89f1, &(0x7f0000000d40)={'ip_vti0\x00', &(0x7f0000000d00)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14}}}}) [ 1782.341191][T24349] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:36 executing program 4: syz_mount_image$tmpfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="cc6f486f06a09b7725d421cb6b9b95361dd1743be35eeeceab06ba25c29f5021000587a2bdf42412df97e3e287c4b3f68241ceb09ee058d9012881de6a7089f72d5e84d22802d749775681223e094551936a21f63b5eef6d2ced7f1dcc046770a0cad908a826020fdc31fb", 0x6b}], 0x0, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/class/lcd', 0x0, 0x0) 20:04:36 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200"/32, 0x20, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xf0}}}, 0xb8}}, 0x0) 20:04:36 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8947, &(0x7f0000000280)={'syztnl0\x00', 0x0}) 20:04:36 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1784.629450][T24388] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:36 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x300}}}, 0xb8}}, 0x0) 20:04:36 executing program 4: syz_open_dev$loop(&(0x7f0000000080), 0x5, 0x0) 20:04:36 executing program 0: open$dir(0x0, 0x61349322985ba207, 0x0) [ 1784.864106][T24400] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:36 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, @in={0x2, 0x0, @empty}, @ax25={0x3, @bcast}, @sco={0x1f, @fixed}, 0xffff, 0x0, 0x0, 0x0, 0x3}) [ 1784.905276][T24391] loop1: detected capacity change from 0 to 61456 20:04:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x500}}}, 0xb8}}, 0x0) 20:04:37 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r1 = socket$pppl2tp(0x18, 0x1, 0x1) socket$pppl2tp(0x18, 0x1, 0x1) sendmsg$unix(r0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x1c, 0x1, 0x1, [r1, r0, r0]}}], 0x20}, 0x0) 20:04:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCADDTUNNEL(r0, 0x8920, &(0x7f0000000280)={'syztnl0\x00', 0x0}) [ 1785.112543][T24391] read_mapping_page failed! [ 1785.124401][T24391] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1785.139534][T24391] Mount JFS Failure: -5 20:04:37 executing program 2: add_key$fscrypt_provisioning(&(0x7f0000000140), &(0x7f0000000180)={'syz', 0x1}, &(0x7f00000001c0)={0x2, 0x0, @a}, 0x48, 0xffffffffffffffff) [ 1785.161794][T24391] jfs_mount failed w/return code = -5 [ 1785.173281][T24414] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:37 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200"/32, 0x20, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:37 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x89a0, 0x0) 20:04:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x600}}}, 0xb8}}, 0x0) [ 1785.458362][T24426] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1785.512710][T24428] loop1: detected capacity change from 0 to 61456 [ 1785.556668][T24428] read_mapping_page failed! [ 1785.564744][T24428] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1785.579275][T24428] Mount JFS Failure: -5 [ 1785.588054][T24428] jfs_mount failed w/return code = -5 20:04:37 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:37 executing program 2: openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x1c534db508803af5, 0x0) 20:04:37 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000ac0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r1, 0x4bfb, &(0x7f00000007c0)) 20:04:37 executing program 0: openat2$dir(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x18) open$dir(&(0x7f00000000c0)='./file0\x00', 0x200200, 0x0) 20:04:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x700}}}, 0xb8}}, 0x0) 20:04:37 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009000000", 0x30, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:37 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000240)={'sit0\x00', &(0x7f00000002c0)={'ip6gre0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast1, @remote}}) [ 1785.721445][T24442] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:37 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x732}}}, 0xb8}}, 0x0) 20:04:37 executing program 2: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) ioctl$PPPIOCSACTIVE(r0, 0xc0189436, 0x0) 20:04:37 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000001c80)={[{@size={'size', 0x3d, [0x25, 0x39]}}]}) [ 1785.828033][T24449] loop1: detected capacity change from 0 to 61456 20:04:37 executing program 0: openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/block/ram11', 0xf6ffffff, 0x0) [ 1785.880315][T24449] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1785.917585][T24459] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1785.919680][T24449] Mount JFS Failure: -5 20:04:38 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, "2e83be991ee68826574447ce001900a3ecd70c"}) [ 1785.966582][T24462] tmpfs: Bad value for 'size' [ 1785.973799][T24449] jfs_mount failed w/return code = -5 [ 1785.998212][T24462] tmpfs: Bad value for 'size' 20:04:38 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x900}}}, 0xb8}}, 0x0) 20:04:38 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001680)='ns/net\x00') socket$inet_udp(0x2, 0x2, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0}) pselect6(0x40, &(0x7f0000000000)={0x8}, &(0x7f0000000040)={0x5}, &(0x7f0000000080)={0x1f}, &(0x7f0000000100)={r0}, &(0x7f0000000180)={&(0x7f0000000140)={[0x4]}, 0x8}) 20:04:38 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000ac0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r1, 0x80045440, &(0x7f00000007c0)) 20:04:38 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009000000", 0x30, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:38 executing program 2: wait4(0xffffffffffffffff, 0x0, 0x1000000, &(0x7f0000000040)) 20:04:38 executing program 2: shmctl$SHM_LOCK(0x0, 0xe) 20:04:38 executing program 4: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x5421, &(0x7f0000000040)={'macvlan1\x00'}) [ 1786.767410][T24478] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1786.795007][T24481] loop1: detected capacity change from 0 to 61456 20:04:38 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/rt_cache\x00') 20:04:38 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xa00}}}, 0xb8}}, 0x0) 20:04:38 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8919, &(0x7f0000000280)={'tunl0\x00', 0x0}) [ 1786.902910][T24481] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1786.936414][T24481] Mount JFS Failure: -5 [ 1786.961311][T24481] jfs_mount failed w/return code = -5 20:04:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b31, &(0x7f00000007c0)) [ 1787.000248][T24498] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:39 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89b0, &(0x7f0000000280)={'tunl0\x00', 0x0}) 20:04:39 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009000000", 0x30, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:39 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:39 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xe00}}}, 0xb8}}, 0x0) 20:04:39 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4020940d, &(0x7f00000007c0)) 20:04:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x5427, 0x0) 20:04:39 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x3) ioctl$VT_RELDISP(r0, 0x5605) [ 1787.832227][T24518] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:39 executing program 2: socket$inet(0x2c, 0x3, 0x0) 20:04:40 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b2f, 0x0) 20:04:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xf00}}}, 0xb8}}, 0x0) 20:04:40 executing program 4: bpf$MAP_CREATE(0x14, &(0x7f0000000200), 0x40) [ 1788.049647][T24529] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1788.059507][T24522] loop1: detected capacity change from 0 to 61456 20:04:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x1036}}}, 0xb8}}, 0x0) 20:04:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDSKBSENT(r0, 0x4b49, &(0x7f00000001c0)={0x20, "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"}) [ 1788.292599][T24522] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1788.313395][T24541] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1788.322462][T24522] Mount JFS Failure: -5 [ 1788.340310][T24522] jfs_mount failed w/return code = -5 20:04:40 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/56, 0x38, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1788.677276][T24548] loop1: detected capacity change from 0 to 61456 [ 1788.722727][T24548] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1788.761418][T24548] Mount JFS Failure: -5 [ 1788.776040][T24548] jfs_mount failed w/return code = -5 20:04:40 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:40 executing program 0: syz_mount_image$romfs(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000380), 0x0, &(0x7f0000000400)={[{'\x00'}]}) 20:04:40 executing program 4: io_setup(0x7fffffff, &(0x7f0000000040)) 20:04:40 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000480)={0x1, 0x0, 0x20, 0x0, 0x0, 0x0}) 20:04:40 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x1f00}}}, 0xb8}}, 0x0) 20:04:40 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/56, 0x38, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:41 executing program 0: io_setup(0x3ea4, &(0x7f0000000000)=0x0) io_pgetevents(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0) 20:04:41 executing program 2: r0 = syz_init_net_socket$nl_rdma(0x10, 0x3, 0x10) sendmsg$RDMA_NLDEV_CMD_SYS_SET(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x18, 0x1407, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_DEV_DIM={0x5}]}, 0x18}}, 0x0) [ 1788.940435][T24560] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:41 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x2000}}}, 0xb8}}, 0x0) 20:04:41 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x890b, &(0x7f0000000280)={'tunl0\x00', 0x0}) [ 1789.110797][T24567] loop1: detected capacity change from 0 to 61456 [ 1789.166860][T24579] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:41 executing program 2: syz_emit_ethernet(0x16, &(0x7f0000000040)={@random="5e7c8ee23362", @remote, @void, {@llc_tr={0x11, {@snap={0x0, 0x0, "b4", "f076ac"}}}}}, 0x0) 20:04:41 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8954, 0x0) [ 1789.320461][T24567] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1789.335937][T24567] Mount JFS Failure: -5 [ 1789.340786][T24567] jfs_mount failed w/return code = -5 20:04:42 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:42 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x5410, &(0x7f00000007c0)) 20:04:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x3207}}}, 0xb8}}, 0x0) 20:04:42 executing program 0: syz_mount_image$romfs(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1840045, &(0x7f0000001540)) 20:04:42 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000ac0)) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000200)) 20:04:42 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/56, 0x38, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:42 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0xc0045878, 0x0) 20:04:42 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) ioctl$TIOCSERGETLSR(r0, 0x5459, 0x0) [ 1790.046511][T24603] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1790.068501][T24604] loop1: detected capacity change from 0 to 61456 20:04:42 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x18}, 0x40) 20:04:42 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x3610}}}, 0xb8}}, 0x0) [ 1790.129453][T24604] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1790.183663][T24604] Mount JFS Failure: -5 20:04:42 executing program 0: waitid(0x0, 0x0, 0x0, 0x1ffffffa, 0x0) 20:04:42 executing program 4: bpf$MAP_CREATE(0x18, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) [ 1790.205650][T24604] jfs_mount failed w/return code = -5 [ 1790.272528][T24621] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:43 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:43 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8980, 0x0) 20:04:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x4800}}}, 0xb8}}, 0x0) 20:04:43 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/60, 0x3c, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:43 executing program 0: bpf$MAP_CREATE(0xa, &(0x7f0000000200), 0x40) 20:04:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000340)={0x2, {0x2, 0x0, 0x0, 0x0, 0x8001}}) [ 1791.064731][ T1235] ieee802154 phy0 wpan0: encryption failed: -22 [ 1791.071121][ T1235] ieee802154 phy1 wpan1: encryption failed: -22 20:04:43 executing program 2: bpf$MAP_CREATE(0x1e, &(0x7f0000000200), 0x40) 20:04:43 executing program 0: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_buf(r0, 0x107, 0x1, &(0x7f0000000000)="ba7b70c06517adaa2dad75edacd660a1", 0x10) [ 1791.180781][T24641] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1791.201735][T24644] loop1: detected capacity change from 0 to 61456 20:04:43 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x6, 0x0, "9d2ba3a59fe69e58743d9f17a05664e77cd77c"}) 20:04:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x4c00}}}, 0xb8}}, 0x0) [ 1791.248437][T24644] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1791.295977][T24644] Mount JFS Failure: -5 20:04:43 executing program 0: io_setup(0xdd42, &(0x7f0000000000)=0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) io_submit(r0, 0x2, &(0x7f0000001480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000000)="5dcce3992baa0e2d85f6e40cd5f244d89b0508932385cad14fd9e4", 0x1b, 0x2, 0x0, 0x2}, 0x0]) [ 1791.321546][T24644] jfs_mount failed w/return code = -5 20:04:43 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSF(r0, 0x5404, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x9f43, 0x0, "79a736ed90b40167abea7a948a273e59fc8f76"}) 20:04:43 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:43 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/60, 0x3c, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x6000}}}, 0xb8}}, 0x0) 20:04:43 executing program 4: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001680)='ns/net\x00') socket$inet_udp(0x2, 0x2, 0x0) clock_gettime(0x0, &(0x7f00000000c0)) pselect6(0x40, &(0x7f0000000000)={0x8}, 0x0, &(0x7f0000000080)={0x1f}, 0x0, 0x0) 20:04:43 executing program 2: bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x0, 0x0, 0x0, &(0x7f0000000140)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 20:04:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x6800}}}, 0xb8}}, 0x0) [ 1791.570989][T24669] loop1: detected capacity change from 0 to 61456 [ 1791.615164][T24669] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1791.646738][T24669] Mount JFS Failure: -5 20:04:43 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x0, 0x884, 0xffffffffffffffff, 0xd12a, '\x00', 0x0, 0xffffffffffffffff, 0x1, 0x5}, 0x40) [ 1791.671533][T24669] jfs_mount failed w/return code = -5 20:04:43 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x80045440, &(0x7f00000007c0)) 20:04:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x6c00}}}, 0xb8}}, 0x0) 20:04:43 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/60, 0x3c, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:43 executing program 2: r0 = socket(0x25, 0x80805, 0x0) syz_genetlink_get_family_id$devlink(&(0x7f0000000040), r0) 20:04:43 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:43 executing program 4: socket(0x25, 0x3, 0xe3aa) [ 1791.848868][T24691] __nla_validate_parse: 3 callbacks suppressed [ 1791.848888][T24691] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:43 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x7400}}}, 0xb8}}, 0x0) 20:04:44 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001680)='ns/net\x00') syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000300), 0xffffffffffffffff) syz_genetlink_get_family_id$SEG6(&(0x7f0000000800), 0xffffffffffffffff) 20:04:44 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x891b, &(0x7f0000000280)={'tunl0\x00', 0x0}) [ 1791.975154][T24700] loop1: detected capacity change from 0 to 61456 20:04:44 executing program 4: syz_open_procfs(0x0, &(0x7f0000000c00)='smaps\x00') 20:04:44 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89a0, &(0x7f0000000280)={'tunl0\x00', 0x0}) [ 1792.051597][T24700] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1792.063109][T24710] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1792.111701][T24700] Mount JFS Failure: -5 20:04:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x7a00}}}, 0xb8}}, 0x0) 20:04:44 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1792.135324][T24700] jfs_mount failed w/return code = -5 20:04:44 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000ac0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r1, 0x4b4b, &(0x7f00000007c0)) 20:04:44 executing program 4: syz_mount_image$romfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, &(0x7f00000002c0)) 20:04:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xf000}}}, 0xb8}}, 0x0) 20:04:44 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/62, 0x3e, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1792.234654][T24721] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b37, 0x0) 20:04:44 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) 20:04:44 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTRESET(r0, 0x4b6d, 0x0) 20:04:44 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000240)={0xb, 0x0, 0x0, 0x2, 0x101, 0x1}, 0x40) [ 1792.404422][T24738] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:44 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x34000}}}, 0xb8}}, 0x0) 20:04:44 executing program 2: io_setup(0x4, &(0x7f0000000240)=0x0) io_cancel(r0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) [ 1792.579775][T24739] loop1: detected capacity change from 0 to 61456 20:04:44 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b2f, &(0x7f00000007c0)) 20:04:44 executing program 0: bpf$MAP_CREATE(0x2, &(0x7f0000000200), 0x40) [ 1792.736482][T24753] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1792.771304][T24739] jfs_mount: diMount(ipaimap2) failed, rc = -5 20:04:44 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x400300}}}, 0xb8}}, 0x0) 20:04:44 executing program 4: unshare(0x44040000) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x20008000) syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), 0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r0) [ 1792.792118][T24739] Mount JFS Failure: -5 [ 1792.808830][T24739] jfs_mount failed w/return code = -5 20:04:45 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/60, 0x3c, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:45 executing program 0: syz_emit_ethernet(0x66, &(0x7f0000000000)={@local, @dev, @void, {@mpls_uc={0x8847, {[], @ipv6=@icmpv6={0x0, 0x6, "444ab9", 0x30, 0x3a, 0x0, @private2, @dev, {[], @time_exceed={0x3, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "af4566", 0x0, 0x0, 0x0, @private2, @private1}}}}}}}}, 0x0) 20:04:45 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000001680)='ns/net\x00') io_setup(0xdd42, &(0x7f0000000000)=0x0) io_submit(r0, 0x0, 0x0) [ 1792.915061][T24764] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xe0ffff}}}, 0xb8}}, 0x0) 20:04:45 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:45 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1b}, 0x40) [ 1793.159764][T24794] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:45 executing program 0: bpf$MAP_CREATE(0x10, &(0x7f0000000200), 0x40) 20:04:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xf0ffff}}}, 0xb8}}, 0x0) 20:04:45 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b65, &(0x7f00000007c0)) [ 1793.366526][T24798] loop1: detected capacity change from 0 to 61456 20:04:45 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:45 executing program 0: bpf$MAP_CREATE(0x21, &(0x7f0000000200), 0x40) [ 1793.445240][T24816] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1793.572518][T24798] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1793.618040][T24798] Mount JFS Failure: -5 20:04:45 executing program 4: unshare(0x44040000) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x20008000) syz_genetlink_get_family_id$nl802154(&(0x7f0000000100), 0xffffffffffffffff) syz_genetlink_get_family_id$netlbl_cipso(&(0x7f0000000000), r0) [ 1793.652376][T24798] jfs_mount failed w/return code = -5 20:04:45 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/60, 0x3c, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:45 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'tunl0\x00', &(0x7f00000001c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x6, 0x4, 0x0, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @private, {[@end]}}}}}) 20:04:45 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x1000000}}}, 0xb8}}, 0x0) 20:04:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b65, 0x0) 20:04:45 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:45 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b3a, &(0x7f00000007c0)) [ 1793.883768][T24858] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:46 executing program 2: socket(0x28, 0x0, 0x7fffffff) 20:04:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x2000000}}}, 0xb8}}, 0x0) [ 1794.068094][T24864] loop1: detected capacity change from 0 to 61456 [ 1794.139255][T24888] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:46 executing program 0: socket$inet(0x2, 0xa, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000200)='/proc/cgroups\x00', 0x0, 0x0) syz_open_procfs(0x0, &(0x7f0000000780)='fdinfo/4\x00') 20:04:46 executing program 2: socket(0xa, 0x3, 0xff) 20:04:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x3000000}}}, 0xb8}}, 0x0) 20:04:46 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r0, 0x4b72, &(0x7f0000000440)={0x0, 0x0, 0x1b, 0x1c, 0x0, &(0x7f0000000040)="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"}) [ 1794.303768][T24864] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1794.337567][T24864] Mount JFS Failure: -5 [ 1794.351254][T24864] jfs_mount failed w/return code = -5 20:04:46 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/58, 0x3a, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:46 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:46 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETS(r0, 0x5402, &(0x7f0000000040)={0x3, 0x0, 0x0, 0x0, 0x0, "2e83be991ee68826574447ce001900a3ecd70c"}) 20:04:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x4000000}}}, 0xb8}}, 0x0) 20:04:46 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) 20:04:46 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8915, &(0x7f0000000280)={'tunl0\x00', 0x0}) 20:04:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x5000000}}}, 0xb8}}, 0x0) 20:04:46 executing program 0: gettid() getrusage(0x1, &(0x7f0000000180)) 20:04:46 executing program 2: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8970, &(0x7f0000000280)={'tunl0\x00', 0x0}) [ 1794.680391][T24913] loop1: detected capacity change from 0 to 61456 20:04:46 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$PIO_FONTX(r0, 0x4b6c, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000240)="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"}) 20:04:46 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x6000000}}}, 0xb8}}, 0x0) [ 1794.755560][T24913] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1794.817681][T24913] Mount JFS Failure: -5 20:04:46 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000ac0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r1, 0x5423, &(0x7f00000007c0)) [ 1794.838909][T24913] jfs_mount failed w/return code = -5 20:04:47 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/58, 0x3a, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:47 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:47 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x1a}, 0x40) 20:04:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x7000000}}}, 0xb8}}, 0x0) 20:04:47 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000280)={'tunl0\x00', 0x0}) 20:04:47 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4bfa, &(0x7f00000007c0)) 20:04:47 executing program 0: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(0xffffffffffffffff, 0x4b33, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b30, &(0x7f00000007c0)) 20:04:47 executing program 4: bpf$MAP_CREATE(0xe, &(0x7f0000000200), 0x40) 20:04:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x8000000}}}, 0xb8}}, 0x0) [ 1795.121752][T24947] loop1: detected capacity change from 0 to 61456 [ 1795.184883][T24947] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1795.218367][T24947] Mount JFS Failure: -5 20:04:47 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000480)) [ 1795.243828][T24947] jfs_mount failed w/return code = -5 20:04:47 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:47 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000140)) 20:04:47 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/58, 0x3a, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x9000000}}}, 0xb8}}, 0x0) 20:04:47 executing program 0: ioctl$TIOCL_PASTESEL(0xffffffffffffffff, 0x541c, 0x0) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x0) 20:04:47 executing program 2: bpf$MAP_CREATE(0x15, &(0x7f0000000200), 0x40) 20:04:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xa000000}}}, 0xb8}}, 0x0) 20:04:47 executing program 4: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCGRS485(r0, 0x542e, &(0x7f00000000c0)) 20:04:47 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b62, &(0x7f00000007c0)) 20:04:47 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1795.676385][T24979] loop1: detected capacity change from 0 to 61456 20:04:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xe000000}}}, 0xb8}}, 0x0) 20:04:47 executing program 4: io_setup(0x8, &(0x7f0000000340)=0x0) io_destroy(r0) 20:04:47 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0xea, 0x0, 0x7fffffff}, 0xa0) 20:04:47 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xf000000}}}, 0xb8}}, 0x0) [ 1795.891458][T24979] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1795.911605][T24979] Mount JFS Failure: -5 [ 1795.935657][T24979] jfs_mount failed w/return code = -5 20:04:48 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/56, 0x38, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b62, &(0x7f00000007c0)) 20:04:48 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0xc0189436, &(0x7f00000007c0)) 20:04:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x1f000000}}}, 0xb8}}, 0x0) 20:04:48 executing program 4: r0 = syz_genetlink_get_family_id$nbd(&(0x7f0000000080), 0xffffffffffffffff) syz_open_procfs(0x0, &(0x7f00000000c0)='setgroups\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000900)='net/raw6\x00') ioctl$TIOCL_GETSHIFTSTATE(r1, 0x541c, 0x0) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_RECONFIGURE(r2, &(0x7f0000000380)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000340)={&(0x7f0000000300)={0x1c, r0, 0x8, 0x70bd2b, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}]}, 0x1c}, 0x1, 0x0, 0x0, 0x4800}, 0x20000890) 20:04:48 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x20000000}}}, 0xb8}}, 0x0) 20:04:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b62, &(0x7f00000007c0)) 20:04:48 executing program 0: clock_getres(0x0, &(0x7f0000000380)) [ 1796.322514][T25018] loop1: detected capacity change from 0 to 61456 20:04:48 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000ac0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r1, 0x5424, &(0x7f00000007c0)) 20:04:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x32070000}}}, 0xb8}}, 0x0) [ 1796.399629][T25018] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1796.454656][T25018] Mount JFS Failure: -5 20:04:48 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b48, &(0x7f00000007c0)) [ 1796.479903][T25018] jfs_mount failed w/return code = -5 20:04:48 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/56, 0x38, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:48 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b62, &(0x7f00000007c0)) 20:04:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x36100000}}}, 0xb8}}, 0x0) 20:04:48 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:48 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8910, &(0x7f0000000280)={'tunl0\x00', 0x0}) 20:04:48 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x1, 0xea, 0x7, 0x7fffffff}, 0xa0) 20:04:48 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x48000000}}}, 0xb8}}, 0x0) 20:04:48 executing program 2: ioctl$KDGETLED(0xffffffffffffffff, 0x4b62, &(0x7f00000007c0)) 20:04:48 executing program 4: syz_open_procfs(0x0, &(0x7f0000000100)='timers\x00') 20:04:48 executing program 0: syz_mount_image$romfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x2061834, &(0x7f00000002c0)) [ 1796.794967][T25053] loop1: detected capacity change from 0 to 61456 20:04:48 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1796.861935][T25053] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1796.872172][T25062] __nla_validate_parse: 14 callbacks suppressed [ 1796.872192][T25062] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1796.884299][T25053] Mount JFS Failure: -5 [ 1796.900124][T25053] jfs_mount failed w/return code = -5 20:04:49 executing program 2: ioctl$KDGETLED(0xffffffffffffffff, 0x4b62, &(0x7f00000007c0)) 20:04:49 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/56, 0x38, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:49 executing program 4: socketpair(0x28, 0x1, 0x0, &(0x7f0000000100)) 20:04:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x4c000000}}}, 0xb8}}, 0x0) 20:04:49 executing program 0: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000a40), 0x0, 0x0) ioctl$TCSBRKP(r0, 0x5425, 0x0) 20:04:49 executing program 2: ioctl$KDGETLED(0xffffffffffffffff, 0x4b62, &(0x7f00000007c0)) 20:04:49 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, &(0x7f0000000280)) [ 1797.205056][T25084] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:49 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b62, &(0x7f00000007c0)) 20:04:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x60000000}}}, 0xb8}}, 0x0) 20:04:49 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:49 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8927, &(0x7f0000000280)={'tunl0\x00', 0x0}) [ 1797.298744][T25077] loop1: detected capacity change from 0 to 61456 [ 1797.467470][T25096] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:49 executing program 0: socketpair(0x25, 0x0, 0x0, &(0x7f0000000040)) 20:04:49 executing program 4: r0 = socket$nl_rdma(0x10, 0x3, 0x14) sendmsg$RDMA_NLDEV_CMD_RES_MR_GET(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)={0x20, 0x140d, 0x1, 0x0, 0x0, "", [@RDMA_NLDEV_ATTR_PORT_INDEX={0x8}, @RDMA_NLDEV_ATTR_RES_MRN={0x8}]}, 0x20}}, 0x0) [ 1797.588733][T25077] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1797.621504][T25077] Mount JFS Failure: -5 [ 1797.641038][T25077] jfs_mount failed w/return code = -5 20:04:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x68000000}}}, 0xb8}}, 0x0) 20:04:49 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(0xffffffffffffffff, 0x4b62, &(0x7f00000007c0)) 20:04:49 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:49 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8912, &(0x7f0000000280)={'tunl0\x00', 0x0}) 20:04:49 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/cgroup\x00') r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBMODE(r0, 0x4b44, &(0x7f0000000140)) 20:04:49 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(0xffffffffffffffff, 0x4b62, &(0x7f00000007c0)) [ 1797.825220][T25113] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:49 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x6c000000}}}, 0xb8}}, 0x0) 20:04:49 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4bfa, 0x0) [ 1798.064205][T25124] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1798.086387][T25117] loop1: detected capacity change from 0 to 61456 [ 1798.325119][T25117] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1798.346244][T25117] Mount JFS Failure: -5 [ 1798.356514][T25117] jfs_mount failed w/return code = -5 20:04:50 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:50 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8903, &(0x7f0000000280)={'tunl0\x00', 0x0}) 20:04:50 executing program 2: syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(0xffffffffffffffff, 0x4b62, &(0x7f00000007c0)) 20:04:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x74000000}}}, 0xb8}}, 0x0) 20:04:50 executing program 4: openat$sysfs(0xffffffffffffff9c, &(0x7f0000002a40)='/sys/block/loop3', 0x200401, 0x0) 20:04:50 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/56, 0x38, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:50 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b62, 0x0) 20:04:50 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/devices\x00', 0x300, 0x0) 20:04:50 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000900)='net/raw6\x00') ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x5452, &(0x7f0000000280)={'tunl0\x00', 0x0}) [ 1798.547330][T25142] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:50 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x7a000000}}}, 0xb8}}, 0x0) [ 1798.616618][T25148] loop1: detected capacity change from 0 to 61456 [ 1798.703041][T25148] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1798.745004][T25148] Mount JFS Failure: -5 20:04:50 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b62, 0x0) 20:04:50 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000ac0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r1, 0x2, &(0x7f00000007c0)) [ 1798.774274][T25148] jfs_mount failed w/return code = -5 [ 1798.827421][T25159] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:51 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(0xffffffffffffffff, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r1, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:51 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TCSETSW2(r0, 0x402c542c, &(0x7f0000000000)={0x0, 0x0, 0xfffffffc, 0x0, 0x0, "d4f915bef534e6fc70285a323f7db81dd74b93"}) 20:04:51 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/56, 0x38, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x80ffffff}}}, 0xb8}}, 0x0) 20:04:51 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b4e, 0x0) 20:04:51 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x4b62, 0x0) [ 1799.692109][T25181] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1799.698020][T25180] loop1: detected capacity change from 0 to 61456 20:04:51 executing program 2: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSLCKTRMIOS(r0, 0x5457, &(0x7f00000000c0)) 20:04:51 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000200)={0x2}, 0x40) 20:04:51 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8930, &(0x7f0000000280)={'tunl0\x00', 0x0}) 20:04:51 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x9effffff}}}, 0xb8}}, 0x0) [ 1799.810531][T25180] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1799.853137][T25180] Mount JFS Failure: -5 [ 1799.886992][T25180] jfs_mount failed w/return code = -5 20:04:52 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/56, 0x38, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:52 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/bus/input/devices\x00', 0x0, 0x0) [ 1799.989104][T25197] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1800.118147][T25203] loop1: detected capacity change from 0 to 61456 [ 1800.177628][T25203] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1800.202760][T25203] Mount JFS Failure: -5 [ 1800.219339][T25203] jfs_mount failed w/return code = -5 20:04:52 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:52 executing program 0: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x8913, &(0x7f0000000280)={'tunl0\x00', 0x0}) 20:04:52 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x5411, &(0x7f0000000280)={'tunl0\x00', 0x0}) 20:04:52 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xf0ffffff}}}, 0xb8}}, 0x0) 20:04:52 executing program 2: syz_mount_image$romfs(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) 20:04:52 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:52 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in6=@loopback, @in=@remote}}, {{}, 0x0, @in=@private}}, &(0x7f0000000000)=0xffffffffffffff58) [ 1800.858538][T25223] loop1: detected capacity change from 0 to 61456 [ 1800.866814][T25224] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:52 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$GIO_UNISCRNMAP(r0, 0x4b69, &(0x7f00000016c0)=""/4096) 20:04:52 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_GET(r0, 0x4b72, &(0x7f0000000400)={0x1, 0x0, 0x15, 0x15}) [ 1800.911266][T25223] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1800.911266][T25223] [ 1800.967143][T25223] ERROR: (device loop1): remounting filesystem as read-only [ 1800.998861][T25223] xtLookup: xtSearch returned -5 20:04:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xffffe000}}}, 0xb8}}, 0x0) [ 1801.021931][T25223] read_mapping_page failed! 20:04:53 executing program 4: openat$sysfs(0xffffffffffffff9c, 0x0, 0xb82c17b9774d0714, 0x0) [ 1801.042281][T25223] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1801.059983][T25223] Mount JFS Failure: -5 [ 1801.073040][T25223] jfs_mount failed w/return code = -5 20:04:53 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGKBTYPE(r0, 0x4b33, &(0x7f0000000ac0)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r1, 0x5412, &(0x7f00000007c0)) 20:04:53 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:53 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xfffff000}}}, 0xb8}}, 0x0) 20:04:53 executing program 2: r0 = socket(0x23, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f0000000680)={0x0, 0x0, 0x0}, 0x0) 20:04:53 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) r1 = dup(r0) sendmsg$inet_sctp(r1, &(0x7f00000003c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) sendmsg$inet_sctp(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@init={0x14}, @prinfo={0x14}, @prinfo={0x14}, @dstaddrv6={0x1c, 0x84, 0xa, @mcast1}, @prinfo={0x14}, @sndinfo={0x1c}, @dstaddrv6={0x1c, 0x84, 0xa, @loopback}, @sndinfo={0x1c}], 0xc0}, 0x2018d) 20:04:53 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:53 executing program 0: bpf$MAP_CREATE(0x0, &(0x7f0000000000), 0x40) r0 = socket(0x11, 0x3, 0x0) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x8901, &(0x7f0000000180)) [ 1801.911096][T25262] __nla_validate_parse: 1 callbacks suppressed [ 1801.911116][T25262] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:54 executing program 2: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x20088881, &(0x7f0000000000)={0xa, 0x4e1d, 0x0, @dev={0xfe, 0x80, '\x00', 0x34}}, 0x1c) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e", 0xffd6, 0xc001, 0x0, 0xffffffffffffff0c) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000080), 0x4) 20:04:54 executing program 4: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000000), 0x4) 20:04:54 executing program 0: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000000)='ns/pid\x00') getresuid(&(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0)) 20:04:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xffffff7f}}}, 0xb8}}, 0x0) 20:04:54 executing program 4: r0 = syz_usbip_server_init(0x0) write$usbip_server(r0, &(0x7f00000001c0)=@ret_submit={{}, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, "", [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x1010) [ 1802.099420][T25261] loop1: detected capacity change from 0 to 61456 [ 1802.180772][T25261] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1802.180772][T25261] [ 1802.182474][T25277] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:54 executing program 0: ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, 0x0) r0 = syz_usbip_server_init(0x3) write$usbip_server(r0, &(0x7f00000001c0)=@ret_submit={{0x3, 0x4}, 0x0, 0x0, 0x0, 0xfe, 0x0, 0x0, "", [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0, 0x5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}]}, 0x1010) [ 1802.230733][T25261] ERROR: (device loop1): remounting filesystem as read-only [ 1802.286843][T25261] xtLookup: xtSearch returned -5 [ 1802.294848][T25282] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 1802.311915][T25261] read_mapping_page failed! [ 1802.357792][T25261] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1802.385728][T25261] Mount JFS Failure: -5 [ 1802.403936][T25261] jfs_mount failed w/return code = -5 [ 1802.414034][T25286] vhci_hcd vhci_hcd.0: pdev(0) rhport(0) sockfd(3) [ 1802.420579][T25286] vhci_hcd vhci_hcd.0: devid(0) speed(3) speed_str(high-speed) [ 1802.447497][T25286] vhci_hcd vhci_hcd.0: Device attached 20:04:54 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:54 executing program 2: syz_mount_image$udf(0x0, &(0x7f0000000840)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={[{}]}) syz_mount_image$squashfs(&(0x7f00000000c0), &(0x7f00000002c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000940)=[{&(0x7f00000003c0)='T', 0x1, 0x10001}, {&(0x7f0000000480)="0f", 0x1}, {0x0}], 0x428, &(0x7f0000000a40)={[{}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x65, 0x38, 0x63, 0x37, 0x63, 0x64, 0x32], 0x2d, [0x66, 0x52, 0x65, 0x34], 0x2d, [0x35, 0x65, 0x64, 0x38], 0x2d, [0x37, 0x34, 0x35, 0x61], 0x2d, [0x0, 0x3a472a9aff80b1e7, 0x5, 0x37, 0x39, 0x66, 0x38, 0x33]}}}]}) 20:04:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xffffff80}}}, 0xb8}}, 0x0) [ 1802.467525][T25287] vhci_hcd: connection closed [ 1802.468255][ T10] vhci_hcd: stop threads [ 1802.539468][ T10] vhci_hcd: release socket [ 1802.569165][ T10] vhci_hcd: disconnect device [ 1802.603460][T25296] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:54 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xffffff9e}}}, 0xb8}}, 0x0) [ 1802.643974][T24382] vhci_hcd: vhci_device speed not set [ 1802.673769][T25299] loop1: detected capacity change from 0 to 61456 [ 1802.693007][T25300] loop2: detected capacity change from 0 to 256 [ 1802.720754][T25299] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1802.720754][T25299] [ 1802.757853][T25307] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1802.785073][T20302] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 1802.795603][T25299] ERROR: (device loop1): remounting filesystem as read-only [ 1802.815953][T25297] loop2: detected capacity change from 0 to 256 [ 1802.819792][T25299] xtLookup: xtSearch returned -5 [ 1802.828629][T20302] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 0 [ 1802.855426][T25282] vhci_hcd: Failed attach request for unsupported USB speed: UNKNOWN [ 1802.862313][T25299] read_mapping_page failed! [ 1802.880951][T25299] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1802.887298][T20302] Buffer I/O error on dev loop2, logical block 0, async page read [ 1802.931786][T25299] Mount JFS Failure: -5 [ 1802.944122][T25299] jfs_mount failed w/return code = -5 20:04:55 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, 0x0) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xfffffff0}}}, 0xb8}}, 0x0) 20:04:55 executing program 2: syz_mount_image$udf(0x0, &(0x7f0000000840)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000140)={[{}]}) syz_mount_image$squashfs(&(0x7f00000000c0), &(0x7f00000002c0)='./file0\x00', 0x0, 0x3, &(0x7f0000000940)=[{&(0x7f00000003c0)='T', 0x1, 0x10001}, {&(0x7f0000000480)="0f", 0x1}, {0x0}], 0x428, &(0x7f0000000a40)={[{}], [{@fsuuid={'fsuuid', 0x3d, {[0x65, 0x65, 0x38, 0x63, 0x37, 0x63, 0x64, 0x32], 0x2d, [0x66, 0x52, 0x65, 0x34], 0x2d, [0x35, 0x65, 0x64, 0x38], 0x2d, [0x37, 0x34, 0x35, 0x61], 0x2d, [0x0, 0x3a472a9aff80b1e7, 0x5, 0x37, 0x39, 0x66, 0x38, 0x33]}}}]}) 20:04:55 executing program 4: r0 = syz_open_dev$sndpcmc(&(0x7f00000000c0), 0x0, 0x0) ioctl$SNDRV_PCM_IOCTL_HW_FREE(r0, 0x4112, 0x0) 20:04:55 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000140)={@in6={{0xa, 0x0, 0x0, @private0}}, 0x0, 0x0, 0x2f, 0x0, "503ab9ecb98c6fc35d43c5af6571c0d1fff57d9ac80acdf7bda2aa0bd0f66338f3be07bc2913a37e4f78fb5133e76f8d67f948bf0aeb8670122ec98b31d1030d771154da009942b473f204dbeb5c601a"}, 0xd8) 20:04:55 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:55 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f0000000500), &(0x7f0000000540)=0x30) 20:04:55 executing program 0: syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000010100)='\x00NSR03', 0x6, 0x8800}, {&(0x7f0000000140)="0100030012000100cbf1f001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0xc000}, {&(0x7f0000000340)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c1643092d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xc0c0}, {&(0x7f0000010500)="00000000000000000100000000000000000000000000000000000000000000000600030061000100fd10e8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xc1e0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000000102000000000000000200002000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405", 0x6a, 0xc2c0}, {&(0x7f0000010700)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e0102040500000000010000002000020038010000a0000000e0070000000000000000000000000000000000000500030033000100cd0af001620000000500000001000000002b4e535230330000000000000000000000000000000000000000000000000000000000000000000002", 0xa2, 0xc3a0}, {&(0x7f0000010800)="0000000000000000000000000000000000000000000000000300000020050000a0020000002a4c696e757820554446465300000000000000000000000405", 0x3e, 0xc4a0}, {&(0x7f0000011100)="02000300fe0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {0x0, 0x0, 0xa4000}], 0x0, &(0x7f0000013500)=ANY=[]) [ 1803.142663][T25327] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:55 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x40030000000000}}}, 0xb8}}, 0x0) [ 1803.209644][T25328] loop2: detected capacity change from 0 to 256 20:04:55 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000021c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x125d, 0x7fffffffefff) 20:04:55 executing program 4: r0 = socket$inet6_sctp(0xa, 0x5, 0x84) shutdown(r0, 0x0) getsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX3(r0, 0x84, 0x6f, &(0x7f0000000000)={0x0, 0x1c, &(0x7f0000000040)=[@in6={0xa, 0x0, 0x0, @private0}]}, &(0x7f0000000180)=0x10) r1 = socket$inet_sctp(0x2, 0x1, 0x84) getsockopt$inet_sctp_SCTP_MAX_BURST(r1, 0x84, 0xd, &(0x7f0000000000)=@assoc_value={0x0}, &(0x7f0000000040)=0x8) getsockopt$inet_sctp6_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000000c0)={r2}, &(0x7f0000000100)=0x8) 20:04:55 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) close(r0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000100), 0x0, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405001e80228a99f1dd07000300000032"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) r6 = dup2(r0, r5) readv(r6, &(0x7f0000000000)=[{&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/154, 0x9a}], 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @dev}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYRES32=0x0], &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) [ 1803.411814][T25335] loop1: detected capacity change from 0 to 61456 [ 1803.445737][T25344] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1803.747697][T25335] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1803.754695][T25335] Mount JFS Failure: -5 [ 1803.766492][T25335] jfs_mount failed w/return code = -5 20:04:56 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x0, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:56 executing program 4: openat(0xffffffffffffff9c, &(0x7f000000c380)='./file0\x00', 0x105140, 0x0) syz_mount_image$udf(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)='\x00BEA01', 0x6, 0x8000}, {&(0x7f0000010100)='\x00NSR02', 0x6, 0x8800}, {&(0x7f0000010300)="01000200a400010054fbf001600000000100000000000000084c696e757855444600000000000000000000000000000000000000000000090100010003000300010000000100000008313233343536373831323334353637384c696e7578554446", 0x61, 0xc000}, {&(0x7f0000010400)="0000000000000019004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000004f53544120436f6d7072657373656420556e69636f64650000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002a4c696e7578206d6b756466667300000000000000000004050000000000007810e4070913142c16351c1d002a4c696e757820554446465300000000000000000000000405", 0xde, 0xc0c0}, {&(0x7f0000010500)="0000000000000000010000000000000000000000000000000000000000000000060002002d0001002caee8016100000002000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x7d, 0xc1e0}, {&(0x7f0000010600)="000000000000000000000000000000000000000900020000002a4f5354412055444620436f6d706c69616e74000000005001000000000000000200002000000000000000000000004000000001000000002a4c696e757820554446465300000000000000000000000405", 0x6a, 0xc2c0}, {&(0x7f0000010700)="00000000000000000000000000000000004000008000000002400000002a554446205370617261626c6520506172746974696f6e5001040500000000010000002000020038010000a0000000e0070000000000000000000000000000000000000500020055000100c535f001620000000500000001000000002b4e53523032000000000000000000000000000000000000000000000000000002", 0x9a, 0xc3a0}, {&(0x7f0000010800)="0000000000000000000000000000000000000000000000000300000020050000a0020000002a4c696e757820554446465300000000000000000000000405", 0x3e, 0xc4a0}, {&(0x7f0000010d00)="0900020005000100a85b7600800000000010e4070913122c171333010100000000000000000000001800000000000000000000000000000000000000000000000000000000000000010000002e00000080020000a0020000002a4c696e7578205544464653000000000000000000000004050000000000000600000002000000500150010102", 0x86, 0x10000}, {&(0x7f0000011100)="02000200fd0001008f77f00100010000004000006000000000400000c007", 0x1e, 0x20000}, {&(0x7f0000011200)="07010200b3000100204840000000000000000000040000000100000100000000000000002800000000340040060000000012004037000000003e004041000000003e004061000000003e044081", 0x4d, 0xa4000}, {&(0x7f0000011a00)="0001020098000100e59ef001200000007810e4070913142c16351c1d0300030001000000010000000000000000000000004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446", 0x79, 0xa8000}, {&(0x7f0000011b00)="00000000000000000000000000000009004f53544120436f6d7072657373656420556e69636f646500000000000000000000000000000000000000000000000000000000000000000000000000000000084c696e7578554446000000000000000000000000000000000000000000000908436f707972696768740000000000000000000000000000000000000000000a084162737472616374000000000000000000000000000000000000000000000900020000400000000000000000000000002a4f5354412055444620436f6d706c69616e74000000005001", 0xda, 0xa80e0}, {&(0x7f0000012200)="05010200cd0001005381b0004000000000000000040000000100000400000000000001000000000000000000a53c00000200000000000000440100000000000001000000000000000010e4070913122c16351c1d0010e4070913122c17130e360010e4070913122c17130e360100000000000000000000000000000000000000002a4c696e757820554446465300000000000000000000000405000000000000000000000000000000000000100000004401000060", 0xb5, 0xac000}], 0x0, &(0x7f0000013300)) 20:04:56 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f00000000c0)=ANY=[], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x2, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) syz_mount_image$ext4(&(0x7f00000000c0)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f00000002c0)=[{&(0x7f0000010000)="200000004000000003000000300000000f000000000000000200000002000000008000000080000020000000dcf4655fdcf4655f0100ffff53ef010001000000dbf4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010400)="02000000030000000400000030000f", 0xf, 0x1000}, {&(0x7f0000010500)="ffff000000000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x1002, 0x2000}, {&(0x7f0000012600)="ed41000000100000dbf4655fdcf4655fdcf4655f000000000000040008", 0x1d, 0x4200}], 0x0, &(0x7f0000000300)=ANY=[]) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, 0x0, 0x0) sendmsg$netlink(0xffffffffffffffff, 0x0, 0x0) chdir(&(0x7f0000000600)='./file0\x00') r0 = socket(0x11, 0xa, 0x0) sendmsg$DEVLINK_CMD_RATE_GET(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f00000006c0)={&(0x7f0000000640)={0x74, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x2}, @DEVLINK_ATTR_PORT_INDEX={0x8, 0x3, 0x1}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_RATE_NODE_NAME={0xe}, @handle=@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}]}, 0x74}, 0x1, 0x0, 0x0, 0x4000}, 0x8000) ioctl$sock_SIOCADDRT(r0, 0x890b, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81e8943c, &(0x7f0000000400)) sendmsg$NFNL_MSG_CTHELPER_GET(0xffffffffffffffff, 0x0, 0x24008845) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = open(&(0x7f0000000080)='./bus\x00', 0x14d842, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x317d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000380)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20008000}, 0xc, &(0x7f0000000280)={&(0x7f0000000300)=ANY=[@ANYBLOB="34906e2e", @ANYRES16=0x0, @ANYBLOB="000425bd7000fedbdf250600000008003a00fdffffff05002f000000000005002a000000000008003a000100000008003a0005000000080032000700000008003100f9ffffff05002a000000000005002f000100"], 0x5c}, 0x1, 0x0, 0x0, 0x2005}, 0x1000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x80000001) r3 = openat$rtc(0xffffff9c, &(0x7f0000000180), 0x200200, 0x0) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(0xffffffffffffffff, 0xc018937a, &(0x7f00000003c0)={{0x1, 0x1, 0x18, r3, {0x4}}, './bus\x00'}) write(0xffffffffffffffff, &(0x7f00000002c0), 0x0) 20:04:56 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xe0ffff00000000}}}, 0xb8}}, 0x0) [ 1804.241853][ T25] audit: type=1800 audit(1638993896.281:114): pid=25368 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15057 res=0 errno=0 [ 1804.269783][T25370] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1804.276728][T25372] loop4: detected capacity change from 0 to 2752 [ 1804.296848][T25371] loop2: detected capacity change from 0 to 512 20:04:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xf0ffffffffffff}}}, 0xb8}}, 0x0) [ 1804.422454][T25369] loop1: detected capacity change from 0 to 61456 [ 1804.425695][T25372] UDF-fs: INFO Mounting volume 'LinuxUDF', timestamp 2020/09/19 18:44 (1000) [ 1804.466065][ T25] audit: type=1800 audit(1638993896.510:115): pid=25382 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name="bus" dev="sda1" ino=15153 res=0 errno=0 [ 1804.535591][T25371] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue. Quota mode: none. [ 1804.740197][ T25] audit: type=1800 audit(1638993896.780:116): pid=25384 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.2" name=01 dev="sda1" ino=15009 res=0 errno=0 20:04:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x7f, 0x8a, 0x0, 0x0, 0x0, 0x23f, 0x10000, 0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x3f, 0x0, 0xc0, 0x0, 0x9}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0xa) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bpf(0x0, 0x0, &(0x7f00000019c0), 0x0, 0x0) mkdir(&(0x7f0000000080)='./file0/file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0/file0\x00', &(0x7f0000000300)='nfsd\x00', 0x4, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_xen(0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={'trans=xen,', {[{@debug}, {@nodevmap}]}}) [ 1804.787521][T25392] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:56 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x100000000000000}}}, 0xb8}}, 0x0) [ 1804.870740][T25369] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1804.871424][ T25] audit: type=1800 audit(1638993896.840:117): pid=25368 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=collect_data cause=failed(directio) comm="syz-executor.4" name="file0" dev="sda1" ino=15057 res=0 errno=0 [ 1804.892568][T25369] Mount JFS Failure: -5 [ 1804.934552][T25369] jfs_mount failed w/return code = -5 20:04:57 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xa, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) [ 1805.100781][T25400] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:57 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x200000000000000}}}, 0xb8}}, 0x0) 20:04:57 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000000)=@newlink={0x34, 0x10, 0x40b, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, 0x0, 0x1, @geneve={{0xb}, {0x4}}}]}, 0x34}}, 0x0) [ 1805.410985][T25408] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1805.425796][T25404] loop1: detected capacity change from 0 to 61456 [ 1805.636697][T25404] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1805.643845][T25404] Mount JFS Failure: -5 [ 1805.649344][T25404] jfs_mount failed w/return code = -5 20:04:58 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) close(r0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000100), 0x0, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405001e80228a99f1dd07000300000032"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) r6 = dup2(r0, r5) readv(r6, &(0x7f0000000000)=[{&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/154, 0x9a}], 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @dev}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYRES32=0x0], &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) 20:04:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x300000000000000}}}, 0xb8}}, 0x0) 20:04:58 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udp\x00') read$FUSE(r0, &(0x7f0000000140)={0x2020}, 0x2020) 20:04:58 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x0, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:58 executing program 2: ioctl$F2FS_IOC_SET_PIN_FILE(0xffffffffffffffff, 0x4004f50d, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f0000000000), 0x80, 0x0}}], 0x1, 0x0, 0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xff7fffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x800000000000002, 0x0) connect$inet6(r0, 0x0, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000003c0)={{{@in6=@local, @in6=@mcast1}}, {{@in=@multicast1}, 0x0, @in=@broadcast}}, &(0x7f00000004c0)=0xe8) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='limits\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0, 0x0) 20:04:58 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {0x0, 0x0, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x400000000000000}}}, 0xb8}}, 0x0) 20:04:58 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x0, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:04:58 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000001140)={&(0x7f0000000180)=@newlink={0x3c, 0x10, 0x503, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x2001}, [@IFLA_LINKINFO={0x1c, 0x12, 0x0, 0x1, @bridge={{0xb}, {0xc, 0x2, 0x0, 0x1, [@IFLA_BR_STP_STATE={0x8, 0x5, 0x1}]}}}]}, 0x3c}}, 0x0) 20:04:58 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000021c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x127b, 0x20000000) [ 1806.650751][T25442] loop1: detected capacity change from 0 to 61456 20:04:58 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x500000000000000}}}, 0xb8}}, 0x0) 20:04:58 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1806.959960][T25442] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1806.975055][T25442] Mount JFS Failure: -5 [ 1806.979832][T25442] jfs_mount failed w/return code = -5 [ 1807.008936][T25464] __nla_validate_parse: 2 callbacks suppressed [ 1807.008954][T25464] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:04:59 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) close(r0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000100), 0x0, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405001e80228a99f1dd07000300000032"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) r6 = dup2(r0, r5) readv(r6, &(0x7f0000000000)=[{&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/154, 0x9a}], 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @dev}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYRES32=0x0], &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) 20:04:59 executing program 2: r0 = syz_open_dev$loop(&(0x7f00000021c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x127c, 0x20000000) 20:04:59 executing program 4: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001f80), 0x2002, 0x0) write$FUSE_ATTR(r0, 0x0, 0x0) 20:04:59 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x600000000000000}}}, 0xb8}}, 0x0) 20:04:59 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {0x0, 0x0, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:04:59 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:05:00 executing program 4: syz_open_dev$sndpcmc(&(0x7f0000000640), 0x0, 0x147982) 20:05:00 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000001a00310f00"/20, @ANYRES32=0x0, @ANYBLOB="f3ff"], 0x24}}, 0x0) [ 1808.041341][T25495] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:00 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000021c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0xc0481273, 0x20000000) 20:05:00 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x700000000000000}}}, 0xb8}}, 0x0) 20:05:00 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, 0x0) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1808.197013][T25496] loop1: detected capacity change from 0 to 61456 20:05:00 executing program 2: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000002340), 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000000c0)=[@text16={0x10, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_SET_NESTED_STATE(r2, 0x4080aebf, &(0x7f0000000280)={{0x3, 0x0, 0x80, {0x0, 0x0, 0x3}}, "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", "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"}) [ 1808.450923][T25515] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1808.499376][T25496] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1808.514881][T25496] Mount JFS Failure: -5 [ 1808.538526][T25496] jfs_mount failed w/return code = -5 20:05:01 executing program 0: perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3c40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f00000002c0)) close(r0) ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000100), 0x0, 0x0) lstat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TUNSETOWNER(r3, 0x400454cc, r4) bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x0, 0x4, &(0x7f0000000040)=ANY=[@ANYBLOB="b405001e80228a99f1dd07000300000032"], 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) ioctl$TUNSETIFF(r2, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r5, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) r6 = dup2(r0, r5) readv(r6, &(0x7f0000000000)=[{&(0x7f0000000380)=""/167, 0xa7}, {&(0x7f0000000440)=""/154, 0x9a}], 0x2) sendto$inet(0xffffffffffffffff, &(0x7f0000fa3fff), 0x0, 0x0, &(0x7f00006f7000)={0x2, 0x0, @dev}, 0x10) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(0xffffffffffffffff, 0x84, 0x1d, &(0x7f0000000280)=ANY=[@ANYRES32=0x0], &(0x7f0000000080)=0xc) getsockopt$inet_sctp6_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f000059aff8), &(0x7f000034f000)=0x2059b000) 20:05:01 executing program 4: clone(0x80100900, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_int(r0, 0x107, 0xa, &(0x7f0000000080)=0x2, 0x4) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000000)=@req3, 0x1c) accept4(0xffffffffffffffff, 0x0, 0x0, 0x0) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000280)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800}, 0xc, 0x0}, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 20:05:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x800000000000000}}}, 0xb8}}, 0x0) 20:05:01 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:05:01 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {0x0, 0x0, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:01 executing program 2: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local, @link_local, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "2504e8", 0x8, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4, {[@hopopts={0x89}]}}}}}, 0x0) [ 1809.106854][T25545] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:01 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x900000000000000}}}, 0xb8}}, 0x0) 20:05:01 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={0x0}}, 0x0) [ 1809.220812][T25552] loop1: detected capacity change from 0 to 61456 20:05:01 executing program 2: keyctl$search(0xa, 0x0, &(0x7f0000001d40)='blacklist\x00', 0x0, 0x0) [ 1809.315956][T25552] jfs_mount: diMount(ipaimap) failed w/rc = -5 20:05:01 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) [ 1809.364861][T25552] Mount JFS Failure: -5 [ 1809.385859][T25552] jfs_mount failed w/return code = -5 20:05:01 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00), 0x0, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:01 executing program 4: r0 = syz_open_dev$loop(&(0x7f00000021c0), 0x0, 0x0) ioctl$LOOP_SET_DIRECT_IO(r0, 0x2, 0x20000000) [ 1809.460131][T25566] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1809.614822][T25575] loop1: detected capacity change from 0 to 61456 [ 1809.665961][T25575] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1809.678327][T25575] Mount JFS Failure: -5 [ 1809.682994][T25575] jfs_mount failed w/return code = -5 20:05:02 executing program 2: io_setup(0x5, &(0x7f0000000000)=0x0) r1 = syz_open_dev$loop(&(0x7f00000021c0), 0x0, 0xa0401) io_submit(r0, 0x1, &(0x7f00000001c0)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x8, 0x0, r1, 0x0}]) 20:05:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xa00000000000000}}}, 0xb8}}, 0x0) 20:05:02 executing program 4: add_key(&(0x7f0000000000)='id_resolver\x00', 0x0, 0x0, 0x0, 0xfffffffffffffffc) 20:05:02 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)) io_submit(0x0, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)="db", 0x1}]) 20:05:02 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00), 0x0, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:02 executing program 0: syz_emit_ethernet(0x5b, &(0x7f0000000000)={@link_local, @random="f4719843676d", @void, {@ipv4={0x800, @icmp={{0x6, 0x4, 0x0, 0x0, 0x4d, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @loopback, {[@generic={0x0, 0x2}]}}, @echo={0x8, 0x0, 0x0, 0x0, 0x0, "14551a2eab3b0729413cd236f4cbdcd601728d4195771316563a683a3add5ab5e3bbed11fe81d688868ed19079"}}}}}, 0x0) 20:05:02 executing program 4: syz_emit_ethernet(0x52, &(0x7f0000000180)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "9a49bb", 0x1c, 0x3a, 0x0, @local, @local, {[], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @remote}}}}}}, 0x0) 20:05:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xe00000000000000}}}, 0xb8}}, 0x0) [ 1810.317531][T25599] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1810.340011][T25603] loop1: detected capacity change from 0 to 61456 20:05:02 executing program 0: syz_emit_ethernet(0x90, &(0x7f0000000040)={@link_local, @random="f4719843676d", @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x11, 0x0, @local, @broadcast}, {0x0, 0x0, 0x6e, 0x0, @gue={{0x2}, "e4144961a322a5d9d95e6d392c2135690e3526b79ef2738801746f39d37d2dbc7179639e46690f0a6399cbd2c59d2acf3ed314dd28a8c6a333027969b4e14a7ad0d2665a69dc4918f2ed71386343cc86c52146406c37956024c9da491120"}}}}}}, 0x0) 20:05:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)=@delqdisc={0x24, 0x25, 0x1}, 0x24}}, 0x0) [ 1810.418718][T25603] jfs_mount: diMount(ipaimap) failed w/rc = -5 20:05:02 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x0, 0x0) [ 1810.467178][T25603] Mount JFS Failure: -5 [ 1810.486464][T25603] jfs_mount failed w/return code = -5 20:05:02 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00), 0x0, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:02 executing program 4: syz_emit_ethernet(0x52, &(0x7f0000000180)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "9a49bb", 0x1c, 0x3a, 0x0, @local, @local, {[], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @remote}}}}}}, 0x0) [ 1810.617588][T25616] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:02 executing program 2: mq_open(&(0x7f0000000400)='$*,]*\\\x00', 0x40, 0x0, 0x0) 20:05:02 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$netlink(r0, &(0x7f0000002680)={0x0, 0x0, &(0x7f0000002580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0x0) 20:05:02 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xf00000000000000}}}, 0xb8}}, 0x0) [ 1810.729042][T25624] loop1: detected capacity change from 0 to 61456 [ 1810.793049][T25624] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1810.838141][T25624] Mount JFS Failure: -5 20:05:02 executing program 4: syz_emit_ethernet(0x52, &(0x7f0000000180)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "9a49bb", 0x1c, 0x3a, 0x0, @local, @local, {[], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @remote}}}}}}, 0x0) [ 1810.864439][T25624] jfs_mount failed w/return code = -5 20:05:02 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f00000000", 0x50, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:03 executing program 2: clock_nanosleep(0x2, 0x0, &(0x7f0000000000)={0x0, 0x989680}, 0x0) clock_gettime(0x0, 0x0) [ 1810.962466][T25639] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:03 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000040)=@ipv6_getroute={0x44, 0x1a, 0x1, 0x0, 0x0, {}, [@RTA_MULTIPATH={0xc}, @RTA_MARK={0x8}, @RTA_ENCAP={0xc, 0x16, 0x0, 0x1, @SEG6_LOCAL_ACTION={0x8}}, @RTA_ENCAP_TYPE={0x6}]}, 0x44}}, 0x0) 20:05:03 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x0, 0x0) 20:05:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x1f00000000000000}}}, 0xb8}}, 0x0) 20:05:03 executing program 4: syz_emit_ethernet(0x52, &(0x7f0000000180)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "9a49bb", 0x1c, 0x3a, 0x0, @local, @local, {[], @mlv2_query={0x82, 0x0, 0x0, 0x0, 0x0, @remote}}}}}}, 0x0) 20:05:03 executing program 0: syz_emit_ethernet(0x50e, &(0x7f0000000080)={@local, @multicast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "2504e8", 0x4d8, 0x2c, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], "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"}}}}}, 0x0) [ 1811.246597][T25648] loop1: detected capacity change from 0 to 61456 20:05:03 executing program 4: r0 = shmget$private(0x0, 0x6000, 0x100, &(0x7f0000ff7000/0x6000)=nil) shmctl$SHM_STAT(r0, 0xd, &(0x7f0000000000)=""/15) [ 1811.360604][T25662] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:03 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x2000000000000000}}}, 0xb8}}, 0x0) 20:05:03 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x0, 0x0) 20:05:03 executing program 0: sendmsg$ETHTOOL_MSG_COALESCE_GET(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$tipc2(&(0x7f0000000040), 0xffffffffffffffff) syz_emit_ethernet(0x42, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaa0086dd60a80999000c1100fe8000000000000000000000000000bbca597f8d524f37d9d81f31f06312fe800000aa00000000000c901313c9447d9001f345257193"], 0x0) 20:05:03 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000480)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "146a77", 0x44, 0x2f, 0x0, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}}}}, 0x0) [ 1811.704531][T25648] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1811.738728][T25648] Mount JFS Failure: -5 [ 1811.743422][T25648] jfs_mount failed w/return code = -5 [ 1811.758559][T25674] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:03 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10", 0x1, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:04 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = add_key$keyring(&(0x7f0000000040), &(0x7f0000000080)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) keyctl$unlink(0x9, r1, 0xfffffffffffffffd) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x242800, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r2, 0x0, 0x0) syz_genetlink_get_family_id$SEG6(&(0x7f00000005c0), r2) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100), 0xffffffffffffffff) sendmsg$TIPC_NL_LINK_GET(r2, &(0x7f0000000380)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000340)={&(0x7f0000000140)={0x1e4, r3, 0x0, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0x3c, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x14}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x8}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1f}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1ff}]}]}, @TIPC_NLA_BEARER={0x88, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e22, 0x2, @mcast1, 0x8}}, {0x14, 0x2, @in={0x2, 0x4e23, @remote}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x3}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1a4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10001}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0xfffffbff}]}, @TIPC_NLA_NET={0x60, 0x7, 0x0, 0x1, [@TIPC_NLA_NET_ADDR={0x8, 0x2, 0x7fff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x2617}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2741}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x5}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x401}, @TIPC_NLA_NET_ADDR={0x8, 0x2, 0x2}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x3a2d5772}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xbf0000000}]}, @TIPC_NLA_MON={0x34, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x5}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9f48}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x6f3}]}, @TIPC_NLA_MEDIA={0x78, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x22}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x16}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x673}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xb8a3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x10a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xdf8}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}]}]}, 0x1e4}, 0x1, 0x0, 0x0, 0x8004}, 0x4000005) sendmsg$IPVS_CMD_DEL_DEST(r2, &(0x7f0000000580)={&(0x7f0000000480)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000540)={&(0x7f00000004c0)={0x64, 0x0, 0x100, 0x70bd2d, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_FLAGS={0x6, 0xf, 0x6}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3}, @IPVS_CMD_ATTR_DAEMON={0x24, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x5, 0x8, 0x5b}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x5}, @IPVS_DAEMON_ATTR_STATE={0x8}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x6}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x9}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xfffffff9}]}, 0x64}, 0x1, 0x0, 0x0, 0x1}, 0x20008044) ioctl$ifreq_SIOCGIFINDEX_wireguard(r0, 0x8933, &(0x7f0000000000)={'wg1\x00'}) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x242800, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r4, 0x0, 0x0) sendmsg$TIPC_NL_MON_PEER_GET(r4, &(0x7f0000000f40)={&(0x7f0000000bc0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000f00)={&(0x7f0000000c00)={0x2e0, r3, 0x1, 0x70bd2b, 0x25dfdbff, {}, [@TIPC_NLA_MEDIA={0x1c, 0x5, 0x0, 0x1, [@TIPC_NLA_MEDIA_NAME={0x7, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}, @TIPC_NLA_BEARER={0xc8, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x20, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x2}}, {0x14, 0x2, @in={0x2, 0x4e23, @local}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e23, @local}}, {0x14, 0x2, @in={0x2, 0x4e23, @multicast1}}}}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x3}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x11}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xe}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xeb}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}]}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, 0x0, 0x1, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_NODE={0x1e8, 0x6, 0x0, 0x1, [@TIPC_NLA_NODE_ID={0x46, 0x3, "d55705714e982ef628638e8382b0d53dabff920ebb9b71d726724e4b08c0d34594eecfb1abf8788602b15fce4f94c3c556e25fac7f8a6d4e6446709a4bcc7f445672"}, @TIPC_NLA_NODE_ID={0xf5, 0x3, "10d5392ed76ab39770af98de60f3ce2bc16f20d5511e6c27f1e86ff049e44c18dd5cbaf9c978acc5d95c1368f448c022b4d3f444c65a3499b6f1303c8c5995e752de026aa4d29f642fcc81bdceb11790e80bf2b3e0f27fa354edecea51767e9d02785d6d23d1424275f063c3759bd59088b48129a7bc68465f4ba702efa93f3d1b544e26b3e1377d9236f453ec5409dc68fddb4628b78a18b65258717727621da8fb929e14e581c4053134ccb2a6caca6dca3d677441dec283ace25b1391132b403c5120fcc30f4d57f7b6aaebd779c97aaced85385206a24c750d452b3bcdb50375cc1cd6ad97497471759a760aeeee25"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1dad}, @TIPC_NLA_NODE_ID={0x73, 0x3, "bac5e53c26e617504ac7e1dd89218fe1323068c1bdfaa08e8c31fce03749b4ded27b521be98764b3755080971c907f129d0a2e4229f20b8c81a2ee3f8b1de602345cca819608bb5861b782c6d88105e7c220f87dbc3d667c2e305ba6abdbb90b7bc90feb0993a623cbc5657aa50b0f"}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xd8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x9}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x1ff}]}]}, 0x2e0}}, 0x44004) r5 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x242800, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r5, 0x0, 0x0) r6 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000440), 0x242800, 0x0) sendmsg$ETHTOOL_MSG_COALESCE_GET(r6, 0x0, 0x0) r7 = syz_open_dev$loop(&(0x7f00000003c0), 0x0, 0x10003) ioctl$BINDER_WRITE_READ(r5, 0xc0306201, &(0x7f0000000b80)={0x11c, 0x0, &(0x7f0000000980)=[@decrefs={0x40046307, 0x1}, @decrefs, @transaction={0x40406300, {0x2, 0x0, 0x0, 0x0, 0x20, 0x0, 0x0, 0x48, 0x18, &(0x7f0000000600)={@fd={0x66642a85, 0x0, r6}, @fd={0x66642a85, 0x0, r7}, @flat=@handle={0x73682a85, 0x1101}}, &(0x7f0000000400)={0x0, 0x18, 0x30}}}, @reply_sg={0x40486312, {0x3, 0x0, 0x0, 0x0, 0x30, 0x0, 0x0, 0x60, 0x18, &(0x7f00000006c0)={@flat=@handle={0x73682a85, 0x1}, @fda={0x66646185, 0x1, 0x1, 0x24}, @ptr={0x70742a85, 0x1, &(0x7f0000000680)=""/19, 0x13, 0x0, 0x23}}, &(0x7f0000000740)={0x0, 0x18, 0x38}}, 0x1000}, @enter_looper, @acquire={0x40046305, 0x3}, @acquire_done, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x68, 0x18, &(0x7f00000008c0)={@ptr={0x70742a85, 0x0, &(0x7f0000000780)=""/101, 0x65, 0x2, 0x33}, @flat=@weak_handle={0x77682a85, 0x0, 0x3}, @ptr={0x70742a85, 0x0, &(0x7f0000000800)=""/187, 0xbb, 0x2, 0xf}}, &(0x7f0000000940)={0x0, 0x28, 0x40}}}, @dead_binder_done, @dead_binder_done], 0xab, 0x0, &(0x7f0000000ac0)="cea063bf6936399b1df64e9275ffef9ffdc74c716ebe945f85c0adc716a9d3fdc9841621e94aff3e05bfa169e9d9b83688bf3694f3446622a8a5a5e50ac5f361841237da733959776ad6b96a3cd2fe98e724031c10db0c509a62cdd6495c7383f9fc9703d93af31ed97c3ed5c293d13fc51fdd3f2b5b88e4ef05de45e4c58ed73932cce11f3fabc5a29b048f0b51206cbfed80b5e2fd0c4a922c60884213e2da11b94ad131c146ffced8f5"}) 20:05:04 executing program 0: syz_open_dev$loop(&(0x7f0000004780), 0x0, 0xc8080) 20:05:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x3207000000000000}}}, 0xb8}}, 0x0) 20:05:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x80000001) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 20:05:04 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x0, &(0x7f0000000180)) [ 1812.127279][T25687] loop1: detected capacity change from 0 to 61456 20:05:04 executing program 0: inotify_add_watch(0xffffffffffffffff, 0x0, 0x12000d36) [ 1812.218994][T25696] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x3610000000000000}}}, 0xb8}}, 0x0) 20:05:04 executing program 2: syz_emit_ethernet(0x832, &(0x7f00000001c0)={@local, @dev, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, "a80999", 0x7fc, 0x11, 0x0, @remote, @local, {[], {0x0, 0x0, 0x7fc, 0x0, @gue={{0x1, 0x0, 0x1, 0x9, 0x0, @void}, "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"}}}}}}}, 0x0) 20:05:04 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x0, &(0x7f0000000180)) [ 1812.568370][T25687] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1812.580421][T25687] Mount JFS Failure: -5 [ 1812.592893][T25687] jfs_mount failed w/return code = -5 [ 1812.640436][T25713] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:04 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r2 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) r3 = add_key(&(0x7f0000000080)='id_resolver\x00', &(0x7f00000000c0)={'syz', 0x0}, &(0x7f0000000180)='\x00', 0x1, r2) keyctl$link(0x8, r3, r0) 20:05:04 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x4800000000000000}}}, 0xb8}}, 0x0) 20:05:04 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10", 0x1, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:04 executing program 2: add_key$keyring(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, 0xffffffffffffffff) 20:05:04 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x80000001) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 20:05:04 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x0, &(0x7f0000000180)) [ 1812.903809][T25725] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:05 executing program 0: bpf$PROG_LOAD(0x5, &(0x7f0000000ec0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0xffffffffffffffff}, 0x78) 20:05:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x4c00000000000000}}}, 0xb8}}, 0x0) [ 1813.075464][T25728] loop1: detected capacity change from 0 to 61456 20:05:05 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, r1) 20:05:05 executing program 0: memfd_create(&(0x7f0000000000), 0x0) [ 1813.227054][T25743] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x6000000000000000}}}, 0xb8}}, 0x0) 20:05:05 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[0x0]) [ 1813.314206][T25728] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1813.322705][T25728] Mount JFS Failure: -5 [ 1813.340590][T25728] jfs_mount failed w/return code = -5 20:05:05 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000080), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r1) keyctl$link(0x8, r0, r2) 20:05:05 executing program 0: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDGETLED(r0, 0x540e, 0x0) [ 1813.416503][T25754] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:05 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10", 0x1, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x6800000000000000}}}, 0xb8}}, 0x0) 20:05:05 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x80000001) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 20:05:05 executing program 2: shmctl$IPC_STAT(0x0, 0x2, &(0x7f0000000040)=""/247) shmctl$SHM_STAT(0x0, 0xd, &(0x7f0000000140)=""/69) 20:05:05 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = getpgrp(0xffffffffffffffff) sendmsg$netlink(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000800)=[@cred={{0x1c, 0x1, 0x2, {r1}}}], 0x20}, 0x0) [ 1813.660211][T25772] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:05 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[0x0]) 20:05:05 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x6c00000000000000}}}, 0xb8}}, 0x0) 20:05:05 executing program 2: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f00000001c0)) [ 1813.779459][T25769] loop1: detected capacity change from 0 to 61456 20:05:05 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route_sched(r0, &(0x7f00000001c0)={&(0x7f0000000100), 0xc, &(0x7f0000000180)={&(0x7f0000000200)=@delchain={0x0, 0x65, 0x0, 0x0, 0x0, {}, [@TCA_RATE]}, 0xfffffd11}}, 0x0) [ 1813.898885][T25785] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x7400000000000000}}}, 0xb8}}, 0x0) 20:05:06 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:06 executing program 0: mq_unlink(&(0x7f0000000080)='{%/#^\x84{\x00') 20:05:06 executing program 2: setresuid(0x0, 0x0, 0x0) setresuid(0x0, 0x0, 0x0) [ 1814.080895][T25799] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:06 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[0x0]) [ 1814.206591][T25801] loop1: detected capacity change from 0 to 61456 20:05:06 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000004c0)='./file0\x00', 0x0, 0x7a04, 0x0) chdir(&(0x7f0000000040)='./file0\x00') r0 = creat(&(0x7f0000000080)='./bus\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x80000001) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 20:05:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x7a00000000000000}}}, 0xb8}}, 0x0) 20:05:06 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) connect$netlink(r0, &(0x7f0000000000), 0xffffffffffffff4e) 20:05:06 executing program 0: syz_open_dev$loop(&(0x7f0000000000), 0x0, 0xb72d37c549b9f913) [ 1814.346772][T25812] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:06 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$ifreq_SIOCGIFINDEX_batadv_hard(r0, 0x8933, 0x0) 20:05:06 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x80ffffff00000000}}}, 0xb8}}, 0x0) 20:05:06 executing program 2: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x1}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x1}, 0x0, 0x0, r0) keyctl$unlink(0x9, r1, r0) 20:05:06 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000200)={@link_local, @random="f4719843676d", @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @dev, @loopback}, @time_exceeded={0xb, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0, @private, @multicast2}}}}}}, 0x0) 20:05:06 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="db", 0x1}]) [ 1814.522476][T25829] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0x9effffff00000000}}}, 0xb8}}, 0x0) 20:05:06 executing program 0: syz_emit_ethernet(0x19, &(0x7f0000000200)={@empty, @empty, @val, {@x25}}, 0x0) [ 1814.679034][T25832] loop1: detected capacity change from 0 to 61456 20:05:06 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_TX_RING(r0, 0x10e, 0x7, &(0x7f0000000000), 0x10) 20:05:06 executing program 2: syz_emit_ethernet(0x8e, &(0x7f0000000500)={@link_local, @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "9a49bb", 0x58, 0x3a, 0x0, @local, @local, {[], @pkt_toobig={0x2, 0x0, 0x0, 0x0, {0x0, 0x6, "2806ec", 0x0, 0x0, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', @private0, [@dstopts={0x33, 0x1, '\x00', [@enc_lim, @pad1, @pad1]}, @srh={0x6c}], "eba8c567ddf6c993"}}}}}}}, 0x0) 20:05:06 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xf0ffffff00000000}}}, 0xb8}}, 0x0) 20:05:06 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x0, 0x0) name_to_handle_at(r0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0) 20:05:06 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="db", 0x1}]) 20:05:06 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xffffff7f00000000}}}, 0xb8}}, 0x0) 20:05:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x4) 20:05:07 executing program 0: r0 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, 0xffffffffffffffff, &(0x7f0000000040)) 20:05:07 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000080)={@local, @multicast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "2504e8", 0x0, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2}}}}, 0x0) 20:05:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x0, 0x0, 0x0, 0xfffffffffffff000}}}, 0xb8}}, 0x0) [ 1815.137453][T25865] loop1: detected capacity change from 0 to 61456 20:05:07 executing program 0: syz_emit_ethernet(0xc2, &(0x7f00000023c0)={@local, @multicast, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "d2b13a", 0x8c, 0x2f, 0x0, @mcast2, @dev, {[@srh={0x3c, 0x8, 0x4, 0x4, 0x0, 0x0, 0x0, [@private1, @private1, @dev, @mcast1]}]}}}}}, 0x0) 20:05:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}}}, 0xb8}}, 0x0) 20:05:07 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f0000000100)="db", 0x1}]) 20:05:07 executing program 4: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000000100)={0x0, @isdn, @l2={0x1f, 0x0, @none}, @sco={0x1f, @fixed}}) 20:05:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x4) 20:05:07 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f00", 0x3d, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x2}}, 0xb8}}, 0x0) 20:05:07 executing program 0: syz_emit_ethernet(0x3e, &(0x7f00000000c0)={@local, @multicast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "2504e8", 0x8, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x19}]}}}}}, 0x0) 20:05:07 executing program 4: keyctl$search(0xa, 0x0, &(0x7f0000001d40)='blacklist\x00', &(0x7f0000001d80)={'syz', 0x3}, 0x0) [ 1815.476234][T25896] loop1: detected capacity change from 0 to 61456 20:05:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x3}}, 0xb8}}, 0x0) 20:05:07 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f00", 0x3d, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:07 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xfd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000100)='+\x8b\x8a\x16^\x84\xa7\x85\x0e\xe5W\f\x00\x00\x00\x00\x00\x00\x00\x00\xe5\xd4\xc4\xd9\x17\xf6\x95\xf2\xc2\x88L\xa4\xb0y\xd8fu\xa5\x1d~\xb6V\xeb\xfd\x89o\xbf\x85\xa0\xaf\x17]\x12\x89\x01\x8fP\x1e\xa0|Zp\xfa', 0x3) write$binfmt_misc(r2, &(0x7f0000000c40)=ANY=[], 0xff67) sendfile(r1, r2, &(0x7f0000000000), 0xffff) fcntl$addseals(r2, 0x409, 0x8) socket(0x0, 0x0, 0x0) dup3(r1, r0, 0x0) 20:05:07 executing program 4: syz_emit_ethernet(0x42, &(0x7f0000000000)={@local, @link_local, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0xffff, 0x0, 0x6, 0x0, @broadcast, @multicast1}, @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 20:05:07 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 20:05:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x4) 20:05:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x4}}, 0xb8}}, 0x0) 20:05:07 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x0}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000080)='user\x00', &(0x7f0000000180)={'syz', 0x2}, &(0x7f00000001c0)='\a', 0x1, r1) add_key(&(0x7f0000000380)='dns_resolver\x00', 0x0, 0x0, 0x0, r2) 20:05:07 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockname$netlink(r0, &(0x7f0000000040), &(0x7f0000000080)=0xc) [ 1815.807459][T25920] loop1: detected capacity change from 0 to 61456 20:05:07 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x5}}, 0xb8}}, 0x0) 20:05:07 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000100)='sysfs\x00', 0x0, 0x0) umount2(&(0x7f00000002c0)='./file0\x00', 0x4) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) connect$inet(r0, &(0x7f0000000280)={0x2, 0x0, @remote}, 0x10) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/exe\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x800000)=nil, 0x800000, 0x1800003, 0x12, r1, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x4) 20:05:08 executing program 0: r0 = socket$netlink(0x10, 0x3, 0xc) setsockopt$netlink_NETLINK_ADD_MEMBERSHIP(r0, 0x10e, 0x1, &(0x7f0000000040)=0xb, 0x4) 20:05:08 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 1816.061746][T25920] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1816.101340][T25920] Mount JFS Failure: -5 [ 1816.121772][T25920] jfs_mount failed w/return code = -5 20:05:08 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100", 0x2a, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:08 executing program 4: syz_emit_ethernet(0xc6, &(0x7f00000000c0)={@remote, @multicast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "2504e8", 0x90, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[@hopopts={0x0, 0x10, '\x00', [@pad1, @generic={0x0, 0x74, "8d1587495e95dcd4379fcb0f448bf01a829edcffe789f2d00c88e44fd2a7ea066ef5bc71473c99b402b095cf4a816e05d268884a12319e5958356e206ff6b7b6f4f7fd90914f05dd3cd7ee1f192c101d8c031d534cedab2596b4d9a2e8e52da7a499854c61f5b887e4ee0415bb56802faf4ac9bb"}, @padn={0x1, 0x2, [0x0, 0x0]}, @enc_lim, @enc_lim]}]}}}}}, 0x0) 20:05:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x6}}, 0xb8}}, 0x0) 20:05:08 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f0000000100), 0x0) 20:05:08 executing program 0: sched_rr_get_interval(0x0, &(0x7f0000001640)) 20:05:08 executing program 0: getresuid(&(0x7f00000003c0), &(0x7f0000000400), &(0x7f0000001b40)) 20:05:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x7}}, 0xb8}}, 0x0) 20:05:08 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) 20:05:08 executing program 2: clock_nanosleep(0x0, 0x0, &(0x7f00000002c0)={0x0, 0x989680}, 0x0) 20:05:08 executing program 4: perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = msgget$private(0x0, 0x0) msgsnd(r0, &(0x7f0000000000)={0x2}, 0x8, 0x0) msgsnd(r0, &(0x7f0000001480)={0x2, "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"}, 0x3f1, 0x0) msgsnd(r0, &(0x7f0000000040)=ANY=[@ANYBLOB='K'], 0x8, 0x0) msgrcv(r0, &(0x7f0000000200)={0x0, ""/66}, 0x4a, 0x0, 0x0) 20:05:08 executing program 0: clock_nanosleep(0x2, 0x1, &(0x7f0000000000)={0x0, 0x989680}, 0x0) clock_gettime(0x0, &(0x7f0000000040)) [ 1816.440263][T25966] loop1: detected capacity change from 0 to 61456 20:05:08 executing program 2: ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) sendmsg$netlink(r0, &(0x7f0000001ec0)={&(0x7f0000000200)=@proc, 0xc, &(0x7f00000017c0)=[{0x0}, {0x0}], 0x2, &(0x7f0000001dc0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xffffffffffffffff, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x38}, 0x1) [ 1816.490783][T25966] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1816.490783][T25966] [ 1816.555675][T25966] ERROR: (device loop1): remounting filesystem as read-only [ 1816.567834][T25966] xtLookup: xtSearch returned -5 [ 1816.573609][T25966] read_mapping_page failed! [ 1816.579623][T25966] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1816.604094][T25966] Mount JFS Failure: -5 [ 1816.617331][T25966] jfs_mount failed w/return code = -5 20:05:08 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100", 0x2a, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:08 executing program 2: r0 = epoll_create1(0x0) epoll_pwait(r0, &(0x7f00000000c0)=[{}], 0x1, 0x0, &(0x7f0000000100), 0x8) 20:05:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x8}}, 0xb8}}, 0x0) 20:05:08 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000c80), 0x4) 20:05:08 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)}]) 20:05:08 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x9}}, 0xb8}}, 0x0) 20:05:08 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xc) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000100)={&(0x7f0000000000), 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 20:05:08 executing program 2: syz_emit_ethernet(0x56, &(0x7f0000000000)={@random="c171ad836565", @multicast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "2504e8", 0x20, 0x0, 0x0, @private0, @private1, {[@hopopts={0x0, 0x2, '\x00', [@generic={0xd9}, @hao={0xc9, 0x10, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}]}]}}}}}, 0x0) 20:05:09 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, &(0x7f0000000b40)={0x10, 0x0, 0x0, 0x40}, 0xc) 20:05:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0xa}}, 0xb8}}, 0x0) [ 1817.090284][T26007] loop1: detected capacity change from 0 to 61456 [ 1817.199614][T26007] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1817.199614][T26007] [ 1817.264378][T26007] ERROR: (device loop1): remounting filesystem as read-only [ 1817.278966][T26007] xtLookup: xtSearch returned -5 [ 1817.289221][T26007] read_mapping_page failed! [ 1817.294670][T26007] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 1817.307666][T26007] Mount JFS Failure: -5 [ 1817.312644][T26007] jfs_mount failed w/return code = -5 20:05:09 executing program 0: r0 = inotify_init() inotify_add_watch(r0, 0x0, 0x1000084) 20:05:09 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)}]) 20:05:09 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100", 0x2a, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:09 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, &(0x7f0000000800)=0xffffffff, 0x4) 20:05:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0xe}}, 0xb8}}, 0x0) 20:05:09 executing program 4: syz_emit_ethernet(0x42, &(0x7f0000000080)={@local, @remote, @void, {@ipv4={0x800, @tipc={{0x5, 0x4, 0x0, 0x0, 0x34, 0x0, 0x0, 0x0, 0x6, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}, @dev}, @payload_direct={{{{0x20, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}}}}, 0x0) 20:05:09 executing program 0: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@local, @multicast, @void, {@ipv6={0x86dd, @tipc_packet={0x0, 0x6, "7aea07", 0x38, 0x6, 0x0, @private2, @remote, {[@dstopts={0x0, 0x0, '\x00', [@generic={0x0, 0x3, "ea5b5a"}]}], @name_distributor={{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}, 0x0) 20:05:09 executing program 4: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000001800)={{0x1, 0x1, 0x18}, './file0\x00'}) getresuid(&(0x7f0000001880), &(0x7f00000018c0), &(0x7f0000001900)) [ 1817.504312][T26036] __nla_validate_parse: 15 callbacks suppressed [ 1817.504334][T26036] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:09 executing program 2: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x0, 0x0) getdents64(r0, &(0x7f0000000040)=""/109, 0x6d) 20:05:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0xf}}, 0xb8}}, 0x0) 20:05:09 executing program 0: rt_sigtimedwait(&(0x7f0000000180), 0x0, &(0x7f0000000240), 0x8) 20:05:09 executing program 3: ioctl$PIO_FONT(0xffffffffffffffff, 0x4b61, &(0x7f0000000080)="4fec9af65f848965ca2962d86ceb6ea59668e893755cbf700f4c704c5d8c2089e96a3a6b63c969100734225124f7419a6b1bbfd9a1650df46c2046384c09c6685cd0284de8e89994009c1f61f0ea94e9d9") perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000040)={'syzkaller1\x00'}) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFADDR(r1, 0x8914, &(0x7f00000000c0)={'syzkaller1\x00', {0x2, 0x0, @initdev}}) io_setup(0x2, &(0x7f0000000400)=0x0) io_submit(r2, 0x1, &(0x7f0000000180)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000100)}]) 20:05:09 executing program 4: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$unlink(0x9, r0, r1) 20:05:09 executing program 0: syz_genetlink_get_family_id$devlink(&(0x7f0000000240), 0xffffffffffffffff) getrlimit(0x0, &(0x7f0000000400)) [ 1817.684279][T26050] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1817.722868][T26043] loop1: detected capacity change from 0 to 61456 20:05:09 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100"/52, 0x34, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:09 executing program 2: setitimer(0x0, &(0x7f0000000000)={{}, {0x0, 0x2710}}, 0x0) setitimer(0x0, 0x0, &(0x7f0000000100)) 20:05:09 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x48}}, 0xb8}}, 0x0) 20:05:09 executing program 4: clock_gettime(0x0, &(0x7f0000000080)={0x0, 0x0}) setitimer(0x2, &(0x7f00000000c0)={{}, {0x0, r0/1000+10000}}, 0x0) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000100)={{}, {0x0, r1/1000+10000}}, 0x0) 20:05:09 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000080)={@local, @multicast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "2504e8", 0x8, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, {[@hopopts]}}}}}, 0x0) 20:05:10 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000b40), 0x0, 0x0) fchownat(r0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x1000) 20:05:10 executing program 3: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, r0) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r0) keyctl$unlink(0x9, r0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key$keyring(&(0x7f0000000100), &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, r1) keyctl$unlink(0x9, r1, r0) syz_emit_ethernet(0x7a, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x0) [ 1818.007023][T26076] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1818.007546][T26077] syz-executor.2 calls setitimer() with new_value NULL pointer. Misfeature support will be removed 20:05:10 executing program 0: syz_emit_ethernet(0x4e, &(0x7f00000000c0)={@broadcast, @multicast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "2504e8", 0x18, 0x0, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @local}, {[@hopopts={0x0, 0x1, '\x00', [@ra, @pad1, @generic]}]}}}}}, 0x0) 20:05:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x4c}}, 0xb8}}, 0x0) [ 1818.104573][T26079] loop1: detected capacity change from 0 to 61456 20:05:10 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100"/52, 0x34, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:10 executing program 2: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/locks\x00', 0x0, 0x0) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, 0x0) 20:05:10 executing program 4: clock_gettime(0x0, &(0x7f0000000000)={0x0, 0x0}) setitimer(0x2, &(0x7f0000000040)={{0x0, r0/1000+60000}}, 0x0) 20:05:10 executing program 0: shmget$private(0x0, 0x3000, 0x1900, &(0x7f0000ffa000/0x3000)=nil) 20:05:10 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmmsg$inet(r0, &(0x7f00000012c0)=[{{&(0x7f0000000080)={0x2, 0x0, @loopback}, 0x10, &(0x7f0000000180)=[{&(0x7f00000000c0)="9c9b", 0x2}], 0x1}}, {{&(0x7f0000000380)={0x2, 0x0, @private}, 0x10, 0x0}}], 0x2, 0x0) [ 1818.224854][T26089] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x60}}, 0xb8}}, 0x0) 20:05:10 executing program 4: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x502) ioctl$LOOP_SET_CAPACITY(r0, 0x4c07) [ 1818.341549][T26100] loop1: detected capacity change from 0 to 61456 20:05:10 executing program 2: r0 = socket$netlink(0x10, 0x3, 0xa) sendmsg$NL80211_CMD_CRIT_PROTOCOL_START(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000080)={0x28, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc}}}}, 0x28}}, 0x0) 20:05:10 executing program 3: r0 = mq_open(&(0x7f0000000400)='$*,]*\\\x00', 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) 20:05:10 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100"/52, 0x34, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:10 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x9) sendmsg$BATADV_CMD_GET_DAT_CACHE(r0, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x14}, 0x14}}, 0x0) 20:05:10 executing program 4: syz_emit_ethernet(0x37, &(0x7f0000000080)={@local, @multicast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, "2504e8", 0x1, 0x2c, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @mcast2, {[], "b1"}}}}}, 0x0) [ 1818.476252][T26112] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:10 executing program 3: syz_emit_ethernet(0x2a, &(0x7f0000000000)={@local, @multicast, @void, {@arp={0x806, @ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x2, @local, @loopback, @dev}}}}, 0x0) 20:05:10 executing program 2: openat$procfs(0xffffffffffffff9c, &(0x7f0000000680)='/proc/bus/input/handlers\x00', 0x0, 0x0) 20:05:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x68}}, 0xb8}}, 0x0) 20:05:10 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) bind$netlink(r0, 0x0, 0x0) [ 1818.547436][T26118] loop1: detected capacity change from 0 to 61456 [ 1818.585077][T26118] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1818.621921][T26118] Mount JFS Failure: -5 [ 1818.635743][T26118] jfs_mount failed w/return code = -5 20:05:10 executing program 4: syz_emit_ethernet(0x12, &(0x7f0000000000)={@dev, @dev, @val={@void}, {@mpls_uc}}, 0x0) 20:05:10 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010", 0x39, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/57, 0x39, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c464", 0x53, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000", 0x2e, 0xb4e0}, {0x0}, {0x0}, {0x0, 0x0, 0xf01000}], 0x0, &(0x7f0000065600)) 20:05:10 executing program 0: r0 = shmget$private(0x0, 0x10000, 0x1000, &(0x7f0000ff0000/0x10000)=nil) shmctl$IPC_RMID(r0, 0x0) 20:05:10 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000003cc0)={0x0, 0x0, &(0x7f0000003c40)=[{&(0x7f0000000000)={0x10}, 0x10}, {&(0x7f0000000080)={0x10}, 0x10}, {&(0x7f0000000540)={0x10}, 0x10}], 0x3}, 0x0) [ 1818.721584][T26130] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. 20:05:10 executing program 5: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000200)=@updpolicy={0xb8, 0x14, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x4}, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {}, 0x6c}}, 0xb8}}, 0x0) 20:05:10 executing program 4: syz_emit_ethernet(0x46, &(0x7f0000000140)={@link_local, @dev, @void, {@ipv6={0x86dd, @dccp_packet={0x0, 0x6, "a9a112", 0x10, 0x21, 0x0, @empty, @mcast2, {[], {{0x0, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "eee98b", 0x0, "919e2d"}}}}}}}, 0x0) [ 1818.867782][T26142] loop1: detected capacity change from 0 to 61456 20:05:11 executing program 0: r0 = epoll_create(0x2) epoll_wait(r0, &(0x7f0000000080)=[{}], 0x1, 0x100) 20:05:11 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$BATADV_CMD_GET_TRANSTABLE_LOCAL(r0, &(0x7f0000000240)={&(0x7f0000000280), 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x3c}, 0xffffffffffffff1f}}, 0x0) [ 1818.939597][T26142] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 1818.970603][T26152] netlink: 104 bytes leftover after parsing attributes in process `syz-executor.5'. [ 1818.988883][T26142] Mount JFS Failure: -5 [ 1819.007402][T26142] jfs_mount failed w/return code = -5 [ 1821.987203][ T1052] netdevsim netdevsim3 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1822.067980][ T1052] netdevsim netdevsim3 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1822.152513][ T1052] netdevsim netdevsim3 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1822.229516][ T1052] netdevsim netdevsim3 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1823.272820][T26207] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 1823.283534][T26207] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 1823.291588][T26207] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 1823.330458][T26207] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 1823.339589][T26207] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 1823.353180][T26207] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 1823.772895][T26169] chnl_net:caif_netlink_parms(): no params data found [ 1824.026047][T26169] bridge0: port 1(bridge_slave_0) entered blocking state [ 1824.054586][T26169] bridge0: port 1(bridge_slave_0) entered disabled state [ 1824.063290][T26169] device bridge_slave_0 entered promiscuous mode [ 1824.084934][T26169] bridge0: port 2(bridge_slave_1) entered blocking state [ 1824.093650][T26169] bridge0: port 2(bridge_slave_1) entered disabled state [ 1824.117624][T26169] device bridge_slave_1 entered promiscuous mode [ 1824.165439][ T1052] device hsr_slave_0 left promiscuous mode [ 1824.172454][ T1052] device hsr_slave_1 left promiscuous mode [ 1824.180870][ T1052] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1824.190196][ T1052] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1824.204884][ T1052] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1824.212326][ T1052] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1824.237237][ T1052] device bridge_slave_1 left promiscuous mode [ 1824.243474][ T1052] bridge0: port 2(bridge_slave_1) entered disabled state [ 1824.255757][ T1052] device bridge_slave_0 left promiscuous mode [ 1824.262927][ T1052] bridge0: port 1(bridge_slave_0) entered disabled state [ 1824.288642][ T1052] device veth1_macvtap left promiscuous mode [ 1824.302640][ T1052] device veth0_macvtap left promiscuous mode [ 1824.311543][ T1052] device veth1_vlan left promiscuous mode [ 1824.318599][ T1052] device veth0_vlan left promiscuous mode [ 1824.713534][ T1052] team0 (unregistering): Port device team_slave_1 removed [ 1824.734446][ T1052] team0 (unregistering): Port device team_slave_0 removed [ 1824.760774][ T1052] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1824.801166][ T1052] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1824.989213][ T1052] bond0 (unregistering): Released all slaves [ 1825.120756][T26169] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1825.162604][T26169] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1825.241463][T26169] team0: Port device team_slave_0 added [ 1825.251722][T26169] team0: Port device team_slave_1 added [ 1825.298035][T26169] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1825.308219][T26169] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1825.351782][T26169] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1825.366751][T26169] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1825.373717][T26169] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1825.402165][ T8490] Bluetooth: hci3: command 0x0409 tx timeout [ 1825.411306][T26169] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1825.505950][T26169] device hsr_slave_0 entered promiscuous mode [ 1825.515223][T26169] device hsr_slave_1 entered promiscuous mode [ 1825.521832][T26169] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1825.532773][T26169] Cannot create hsr debugfs directory [ 1825.928941][T26169] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1825.963350][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1825.989096][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1: link becomes ready [ 1826.014876][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1826.026767][T26169] 8021q: adding VLAN 0 to HW filter on device team0 [ 1826.107405][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bridge: link becomes ready [ 1826.126683][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1826.136613][ T8490] bridge0: port 1(bridge_slave_0) entered blocking state [ 1826.143687][ T8490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1826.153757][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge0: link becomes ready [ 1826.174681][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bridge: link becomes ready [ 1826.185932][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1826.202461][T26193] bridge0: port 2(bridge_slave_1) entered blocking state [ 1826.209645][T26193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1826.227362][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_bond: link becomes ready [ 1826.241744][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_bond: link becomes ready [ 1826.271543][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_team: link becomes ready [ 1826.281358][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1826.291152][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_team: link becomes ready [ 1826.300920][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1826.329737][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1826.350753][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_hsr: link becomes ready [ 1826.369836][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1826.378570][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_hsr: link becomes ready [ 1826.388563][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1826.400358][T26169] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1826.440087][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1826.448984][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1826.466066][T26169] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1826.601635][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_virt_wifi: link becomes ready [ 1826.623306][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1826.659462][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_vlan: link becomes ready [ 1826.668964][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1826.680663][T26169] device veth0_vlan entered promiscuous mode [ 1826.692584][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1826.702040][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1826.728314][T26169] device veth1_vlan entered promiscuous mode [ 1826.760684][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan0: link becomes ready [ 1826.770285][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): macvlan1: link becomes ready [ 1826.788602][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1826.802617][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1826.819317][T26169] device veth0_macvtap entered promiscuous mode [ 1826.841831][T26169] device veth1_macvtap entered promiscuous mode [ 1826.867005][T26169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1826.878116][T26169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1826.889692][T26169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1826.902016][T26169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1826.913576][T26169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1826.926058][T26169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1826.936739][T26169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1826.948103][T26169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1826.960376][T26169] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1826.969769][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1826.980267][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1826.989619][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1826.999272][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1827.011969][T26169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1827.026592][T26169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1827.037955][T26169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1827.049267][T26169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1827.059971][T26169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1827.071487][T26169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1827.082251][T26169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1827.104393][T26169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1827.126145][T26169] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1827.153168][T26169] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1827.175252][T26169] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1827.186460][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1827.200024][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1827.342606][T23592] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1827.365228][T23592] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1827.405346][T13096] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1827.440331][T25258] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1827.456807][T25258] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1827.465959][ T8490] Bluetooth: hci3: command 0x041b tx timeout [ 1827.473010][T13096] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1828.488518][ T1052] device hsr_slave_0 left promiscuous mode [ 1828.504429][ T1052] device hsr_slave_1 left promiscuous mode [ 1828.532345][ T1052] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1828.554053][ T1052] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1828.576439][ T1052] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1828.603828][ T1052] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1828.626048][ T1052] device bridge_slave_1 left promiscuous mode [ 1828.632294][ T1052] bridge0: port 2(bridge_slave_1) entered disabled state [ 1828.672588][ T1052] device bridge_slave_0 left promiscuous mode [ 1828.682235][ T1052] bridge0: port 1(bridge_slave_0) entered disabled state [ 1828.696800][ T1052] device veth1_macvtap left promiscuous mode [ 1828.702838][ T1052] device veth0_macvtap left promiscuous mode [ 1828.710088][ T1052] device veth1_vlan left promiscuous mode [ 1828.719834][ T1052] device veth0_vlan left promiscuous mode [ 1828.897096][ T1052] team0 (unregistering): Port device team_slave_1 removed [ 1828.911768][ T1052] team0 (unregistering): Port device team_slave_0 removed [ 1828.929420][ T1052] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1828.943410][ T1052] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1829.015799][ T1052] bond0 (unregistering): Released all slaves [ 1830.935373][ T6597] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 1830.945561][ T6597] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 1830.954888][ T6597] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 1830.962805][ T6597] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 1830.971733][ T6597] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 1830.980830][ T6597] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 1831.154649][T26567] chnl_net:caif_netlink_parms(): no params data found [ 1831.241807][T26567] bridge0: port 1(bridge_slave_0) entered blocking state [ 1831.249530][T26567] bridge0: port 1(bridge_slave_0) entered disabled state [ 1831.258225][T26567] device bridge_slave_0 entered promiscuous mode [ 1831.269977][T26567] bridge0: port 2(bridge_slave_1) entered blocking state [ 1831.277219][T26567] bridge0: port 2(bridge_slave_1) entered disabled state [ 1831.286728][T26567] device bridge_slave_1 entered promiscuous mode [ 1831.318556][T26567] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1831.333150][T26567] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1831.369937][T26567] team0: Port device team_slave_0 added [ 1831.379803][T26567] team0: Port device team_slave_1 added [ 1831.413652][T26567] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1831.420700][T26567] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1831.449696][T26567] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1831.463018][T26567] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1831.470059][T26567] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1831.496287][T26567] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1831.541875][T26567] device hsr_slave_0 entered promiscuous mode [ 1831.549367][T26567] device hsr_slave_1 entered promiscuous mode [ 1831.558487][T26567] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1831.566634][T26567] Cannot create hsr debugfs directory [ 1831.672862][T26567] bridge0: port 2(bridge_slave_1) entered blocking state [ 1831.679960][T26567] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1831.687349][T26567] bridge0: port 1(bridge_slave_0) entered blocking state [ 1831.695199][T26567] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1831.752390][T26567] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1831.767832][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1831.778416][T19598] bridge0: port 1(bridge_slave_0) entered disabled state [ 1831.786622][T19598] bridge0: port 2(bridge_slave_1) entered disabled state [ 1831.795784][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1831.809729][T26567] 8021q: adding VLAN 0 to HW filter on device team0 [ 1831.824777][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1831.834311][T19598] bridge0: port 1(bridge_slave_0) entered blocking state [ 1831.841402][T19598] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1831.855634][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1831.864146][T26193] bridge0: port 2(bridge_slave_1) entered blocking state [ 1831.871210][T26193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1831.895968][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1831.904854][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1831.925666][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1831.935329][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1831.945264][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1831.956762][T26567] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1831.985497][T26567] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1831.992560][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1832.000685][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1832.069955][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1832.096353][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1832.105266][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1832.113052][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1832.124646][T26567] device veth0_vlan entered promiscuous mode [ 1832.139681][T26567] device veth1_vlan entered promiscuous mode [ 1832.167069][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1832.176332][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1832.191241][T26567] device veth0_macvtap entered promiscuous mode [ 1832.202341][T26567] device veth1_macvtap entered promiscuous mode [ 1832.222512][T26567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1832.233358][T26567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1832.243527][T26567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1832.254343][T26567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1832.264560][T26567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1832.275236][T26567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1832.285706][T26567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1832.296922][T26567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1832.313101][T26567] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1832.321743][T19587] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1832.335055][T19587] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1832.342835][T19587] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1832.355064][T19587] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1832.368665][T26567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1832.380768][T26567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1832.391248][T26567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1832.402834][T26567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1832.413447][T26567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1832.425790][T26567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1832.436892][T26567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1832.447926][T26567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1832.459017][T26567] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1832.470206][T26567] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1832.481534][T26567] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1832.492314][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1832.501426][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1832.606958][T23539] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1832.637182][T23539] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1832.667105][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1832.683958][T14671] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1832.692180][T14671] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1832.706326][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1833.573919][T14671] device hsr_slave_0 left promiscuous mode [ 1833.584794][T14671] device hsr_slave_1 left promiscuous mode [ 1833.616011][T14671] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1833.631500][T14671] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1833.666046][T14671] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1833.687050][T14671] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1833.709532][T14671] device bridge_slave_1 left promiscuous mode [ 1833.727783][T14671] bridge0: port 2(bridge_slave_1) entered disabled state [ 1833.740697][T14671] device bridge_slave_0 left promiscuous mode [ 1833.759659][T14671] bridge0: port 1(bridge_slave_0) entered disabled state [ 1833.790788][T14671] device veth1_macvtap left promiscuous mode [ 1833.797000][T14671] device veth0_macvtap left promiscuous mode [ 1833.804828][T14671] device veth1_vlan left promiscuous mode [ 1833.810653][T14671] device veth0_vlan left promiscuous mode [ 1834.011546][T14671] team0 (unregistering): Port device team_slave_1 removed [ 1834.029974][T14671] team0 (unregistering): Port device team_slave_0 removed [ 1834.041554][T14671] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1834.057943][T14671] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1834.128597][T14671] bond0 (unregistering): Released all slaves [ 1838.182445][ T6597] Bluetooth: hci3: Opcode 0x c03 failed: -110 [ 1841.010049][T26207] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 1841.021269][T26207] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 1841.036085][T26207] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 1841.055373][T26207] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 1841.063755][T26207] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 1841.071157][T26207] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 1841.264218][T26935] chnl_net:caif_netlink_parms(): no params data found [ 1841.333440][T26935] bridge0: port 1(bridge_slave_0) entered blocking state [ 1841.341378][T26935] bridge0: port 1(bridge_slave_0) entered disabled state [ 1841.350086][T26935] device bridge_slave_0 entered promiscuous mode [ 1841.363312][T26935] bridge0: port 2(bridge_slave_1) entered blocking state [ 1841.370563][T26935] bridge0: port 2(bridge_slave_1) entered disabled state [ 1841.379778][T26935] device bridge_slave_1 entered promiscuous mode [ 1841.411406][T26935] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1841.426599][T26935] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1841.459534][T26935] team0: Port device team_slave_0 added [ 1841.471986][T26935] team0: Port device team_slave_1 added [ 1841.498580][T26935] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1841.509628][T26935] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1841.536338][T26935] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1841.549748][T26935] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1841.557190][T26935] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1841.584444][T26935] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1841.625526][T26935] device hsr_slave_0 entered promiscuous mode [ 1841.632777][T26935] device hsr_slave_1 entered promiscuous mode [ 1841.639232][T26935] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1841.647873][T26935] Cannot create hsr debugfs directory [ 1841.752951][T26935] bridge0: port 2(bridge_slave_1) entered blocking state [ 1841.760023][T26935] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1841.767430][T26935] bridge0: port 1(bridge_slave_0) entered blocking state [ 1841.774582][T26935] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1841.829964][T26935] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1841.848802][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1841.862920][ T8511] bridge0: port 1(bridge_slave_0) entered disabled state [ 1841.871020][ T8511] bridge0: port 2(bridge_slave_1) entered disabled state [ 1841.884280][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1841.900120][T26935] 8021q: adding VLAN 0 to HW filter on device team0 [ 1841.913797][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1841.927089][ T8511] bridge0: port 1(bridge_slave_0) entered blocking state [ 1841.934217][ T8511] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1841.962391][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1841.970981][ T8511] bridge0: port 2(bridge_slave_1) entered blocking state [ 1841.978128][ T8511] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1841.987252][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1841.998033][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1842.008817][T19587] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1842.025035][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1842.041181][T26935] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 1842.054277][T26935] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1842.063791][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1842.086993][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1842.095790][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1842.109097][T26935] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1842.190471][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1842.217743][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1842.227417][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1842.235905][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1842.248129][T26935] device veth0_vlan entered promiscuous mode [ 1842.262793][T26935] device veth1_vlan entered promiscuous mode [ 1842.291779][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1842.300251][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1842.313588][T26935] device veth0_macvtap entered promiscuous mode [ 1842.325840][T26935] device veth1_macvtap entered promiscuous mode [ 1842.342779][T26935] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1842.353488][T26935] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1842.363677][T26935] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1842.374438][T26935] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1842.386755][T26935] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1842.398013][T26935] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1842.408128][T26935] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1842.418688][T26935] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1842.430780][T26935] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1842.439425][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1842.447515][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1842.455775][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1842.464572][T19598] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1842.477710][T26935] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1842.489086][T26935] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1842.500867][T26935] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1842.512817][T26935] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1842.523208][T26935] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1842.534663][T26935] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1842.546137][T26935] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1842.558213][T26935] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1842.568851][T26935] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1842.580007][T26935] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1842.593611][T26935] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1842.601968][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1842.610918][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1842.710377][T23543] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1842.726761][T23543] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1842.746148][T22506] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1842.789446][T23543] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1842.801824][T23543] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1842.813702][T22506] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1843.636540][T23592] device hsr_slave_0 left promiscuous mode [ 1843.658446][T23592] device hsr_slave_1 left promiscuous mode [ 1843.672407][T23592] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1843.679918][T23592] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1843.705609][T23592] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1843.721366][T23592] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1843.734041][T23592] device bridge_slave_1 left promiscuous mode [ 1843.740472][T23592] bridge0: port 2(bridge_slave_1) entered disabled state [ 1843.753972][T23592] device bridge_slave_0 left promiscuous mode [ 1843.760193][T23592] bridge0: port 1(bridge_slave_0) entered disabled state [ 1843.775508][T23592] device veth1_macvtap left promiscuous mode [ 1843.781899][T23592] device veth0_macvtap left promiscuous mode [ 1843.788176][T23592] device veth1_vlan left promiscuous mode [ 1843.797330][T23592] device veth0_vlan left promiscuous mode [ 1843.963484][T23592] team0 (unregistering): Port device team_slave_1 removed [ 1843.977379][T23592] team0 (unregistering): Port device team_slave_0 removed [ 1843.991673][T23592] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1844.010192][T23592] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1844.088462][T23592] bond0 (unregistering): Released all slaves [ 1846.029886][ T6597] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 1846.039094][ T6597] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 1846.063551][ T6597] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 1846.080146][ T6597] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 1846.090186][ T6597] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 1846.097630][ T6597] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 1846.320175][T27294] chnl_net:caif_netlink_parms(): no params data found [ 1846.402513][T27294] bridge0: port 1(bridge_slave_0) entered blocking state [ 1846.409644][T27294] bridge0: port 1(bridge_slave_0) entered disabled state [ 1846.419226][T27294] device bridge_slave_0 entered promiscuous mode [ 1846.429500][T27294] bridge0: port 2(bridge_slave_1) entered blocking state [ 1846.439247][T27294] bridge0: port 2(bridge_slave_1) entered disabled state [ 1846.447379][T27294] device bridge_slave_1 entered promiscuous mode [ 1846.487875][T27294] bond0: (slave bond_slave_0): Enslaving as an active interface with an up link [ 1846.503377][T27294] bond0: (slave bond_slave_1): Enslaving as an active interface with an up link [ 1846.543322][T27294] team0: Port device team_slave_0 added [ 1846.552027][T27294] team0: Port device team_slave_1 added [ 1846.583186][T27294] batman_adv: batadv0: Adding interface: batadv_slave_0 [ 1846.592689][T27294] batman_adv: batadv0: The MTU of interface batadv_slave_0 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1846.618703][T27294] batman_adv: batadv0: Not using interface batadv_slave_0 (retrying later): interface not active [ 1846.632415][T27294] batman_adv: batadv0: Adding interface: batadv_slave_1 [ 1846.639360][T27294] batman_adv: batadv0: The MTU of interface batadv_slave_1 is too small (1500) to handle the transport of batman-adv packets. Packets going over this interface will be fragmented on layer2 which could impact the performance. Setting the MTU to 1560 would solve the problem. [ 1846.666251][T27294] batman_adv: batadv0: Not using interface batadv_slave_1 (retrying later): interface not active [ 1846.707560][T27294] device hsr_slave_0 entered promiscuous mode [ 1846.714538][T27294] device hsr_slave_1 entered promiscuous mode [ 1846.721431][T27294] debugfs: Directory 'hsr0' with parent 'hsr' already present! [ 1846.728995][T27294] Cannot create hsr debugfs directory [ 1846.839325][T27294] bridge0: port 2(bridge_slave_1) entered blocking state [ 1846.846459][T27294] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1846.854359][T27294] bridge0: port 1(bridge_slave_0) entered blocking state [ 1846.861525][T27294] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1846.919619][T27294] 8021q: adding VLAN 0 to HW filter on device bond0 [ 1846.937621][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 1846.949939][T26193] bridge0: port 1(bridge_slave_0) entered disabled state [ 1846.958079][T26193] bridge0: port 2(bridge_slave_1) entered disabled state [ 1846.967516][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 1846.982946][T27294] 8021q: adding VLAN 0 to HW filter on device team0 [ 1846.997637][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 1847.008744][ T8490] bridge0: port 1(bridge_slave_0) entered blocking state [ 1847.015846][ T8490] bridge0: port 1(bridge_slave_0) entered forwarding state [ 1847.031609][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 1847.040001][T26193] bridge0: port 2(bridge_slave_1) entered blocking state [ 1847.047117][T26193] bridge0: port 2(bridge_slave_1) entered forwarding state [ 1847.068887][ T8508] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 1847.077766][ T8508] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 1847.090021][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 1847.111610][ T8508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 1847.119896][ T8508] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 1847.136082][T27294] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready [ 1847.156733][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan0: link becomes ready [ 1847.164294][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): vxcan1: link becomes ready [ 1847.181452][T27294] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 1847.257897][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_virt_wifi: link becomes ready [ 1847.280013][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_vlan: link becomes ready [ 1847.289479][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan0: link becomes ready [ 1847.297421][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): vlan1: link becomes ready [ 1847.308892][T27294] device veth0_vlan entered promiscuous mode [ 1847.323192][T27294] device veth1_vlan entered promiscuous mode [ 1847.352752][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_macvtap: link becomes ready [ 1847.362246][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_macvtap: link becomes ready [ 1847.373988][T27294] device veth0_macvtap entered promiscuous mode [ 1847.394450][T27294] device veth1_macvtap entered promiscuous mode [ 1847.416609][T27294] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1847.427504][T27294] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1847.437745][T27294] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1847.448275][T27294] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1847.458756][T27294] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1847.471654][T27294] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1847.483266][T27294] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3d) already exists on: batadv_slave_0 [ 1847.494737][T27294] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1847.506044][T27294] batman_adv: batadv0: Interface activated: batadv_slave_0 [ 1847.515622][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): macvtap0: link becomes ready [ 1847.525159][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): macsec0: link becomes ready [ 1847.533872][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_0: link becomes ready [ 1847.542943][ T8511] IPv6: ADDRCONF(NETDEV_CHANGE): veth0_to_batadv: link becomes ready [ 1847.556426][T27294] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1847.567039][T27294] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1847.577848][T27294] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1847.588549][T27294] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1847.599015][T27294] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1847.610676][T27294] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1847.621695][T27294] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1847.633149][T27294] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1847.643225][T27294] batman_adv: The newly added mac address (aa:aa:aa:aa:aa:3e) already exists on: batadv_slave_1 [ 1847.653974][T27294] batman_adv: It is strongly recommended to keep mac addresses unique to avoid problems! [ 1847.665806][T27294] batman_adv: batadv0: Interface activated: batadv_slave_1 [ 1847.675366][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): batadv_slave_1: link becomes ready [ 1847.684688][T26193] IPv6: ADDRCONF(NETDEV_CHANGE): veth1_to_batadv: link becomes ready [ 1847.776429][T25258] wlan0: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1847.785860][T25258] wlan0: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1847.818877][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): wlan0: link becomes ready [ 1847.866038][ T1052] wlan1: Created IBSS using preconfigured BSSID 50:50:50:50:50:50 [ 1847.876276][ T1052] wlan1: Creating new IBSS network, BSSID 50:50:50:50:50:50 [ 1847.893823][ T8490] IPv6: ADDRCONF(NETDEV_CHANGE): wlan1: link becomes ready [ 1848.793095][ T1052] device hsr_slave_0 left promiscuous mode [ 1848.810975][ T1052] device hsr_slave_1 left promiscuous mode [ 1848.830854][ T1052] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1848.838435][ T1052] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1848.861337][ T1052] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1848.868820][ T1052] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1848.888384][ T1052] device bridge_slave_1 left promiscuous mode [ 1848.895721][ T1052] bridge0: port 2(bridge_slave_1) entered disabled state [ 1848.905014][ T1052] device bridge_slave_0 left promiscuous mode [ 1848.912135][ T1052] bridge0: port 1(bridge_slave_0) entered disabled state [ 1848.924351][ T1052] device veth1_macvtap left promiscuous mode [ 1848.930814][ T1052] device veth0_macvtap left promiscuous mode [ 1848.938153][ T1052] device veth1_vlan left promiscuous mode [ 1848.946829][ T1052] device veth0_vlan left promiscuous mode [ 1849.111201][ T1052] team0 (unregistering): Port device team_slave_1 removed [ 1849.126921][ T1052] team0 (unregistering): Port device team_slave_0 removed [ 1849.138896][ T1052] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1849.158191][ T1052] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1849.224425][ T1052] bond0 (unregistering): Released all slaves [ 1852.500192][ T1235] ieee802154 phy0 wpan0: encryption failed: -22 [ 1852.506562][ T1235] ieee802154 phy1 wpan1: encryption failed: -22 2021/12/08 20:05:50 executor 3 failed 11 times: executor 3: EOF SYZFAIL: failed to mkdtemp (errno 28: No space left on device) [ 1859.856474][ T1052] netdevsim netdevsim0 netdevsim3 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1859.996081][ T1052] netdevsim netdevsim0 netdevsim2 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1860.102192][ T1052] netdevsim netdevsim0 netdevsim1 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1860.163839][ T1052] netdevsim netdevsim0 netdevsim0 (unregistering): unset [1, 0] type 2 family 0 port 6081 - 0 [ 1861.333639][ T1052] device hsr_slave_0 left promiscuous mode [ 1861.344162][ T1052] device hsr_slave_1 left promiscuous mode [ 1861.354978][ T1052] batman_adv: batadv0: Interface deactivated: batadv_slave_0 [ 1861.370901][ T1052] batman_adv: batadv0: Removing interface: batadv_slave_0 [ 1861.392975][ T1052] batman_adv: batadv0: Interface deactivated: batadv_slave_1 [ 1861.409942][ T1052] batman_adv: batadv0: Removing interface: batadv_slave_1 [ 1861.432518][ T1052] device bridge_slave_1 left promiscuous mode [ 1861.441463][ T1052] bridge0: port 2(bridge_slave_1) entered disabled state [ 1861.462863][ T1052] device bridge_slave_0 left promiscuous mode [ 1861.473279][ T1052] bridge0: port 1(bridge_slave_0) entered disabled state [ 1861.496825][ T1052] device veth1_macvtap left promiscuous mode [ 1861.505705][ T1052] device veth0_macvtap left promiscuous mode [ 1861.521366][ T1052] device veth1_vlan left promiscuous mode [ 1861.543139][ T1052] device veth0_vlan left promiscuous mode [ 1861.994134][ T1052] bond2 (unregistering): Released all slaves [ 1862.009305][ T1052] bond1 (unregistering): Released all slaves [ 1862.170646][ T1052] team0 (unregistering): Port device team_slave_1 removed [ 1862.204684][ T1052] team0 (unregistering): Port device team_slave_0 removed [ 1862.222729][ T1052] bond0 (unregistering): (slave bond_slave_1): Releasing backup interface [ 1862.256543][ T1052] bond0 (unregistering): (slave bond_slave_0): Releasing backup interface [ 1862.392835][ T1052] bond0 (unregistering): Released all slaves