0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000003f000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000b00001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1031.843337] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1031.843337] 19:56:25 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46426010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000040000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000fdef000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1032.188128] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1032.188128] 19:56:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000686076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:25 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100007a6076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000f00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1032.285448] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1032.285448] 19:56:25 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46427010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000effd000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000f00001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1032.535497] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1032.535497] [ 1032.551371] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1032.551371] 19:56:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076001f00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:25 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000200000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000300000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:26 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000f06076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:26 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100006c6076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1032.807085] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1032.807085] 19:56:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000400000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1033.046291] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1033.046291] 19:56:26 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46428010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:26 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000008c76000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000500000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000b00000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1033.284729] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1033.284729] [ 1033.306894] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1033.306894] 19:56:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000f00000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000001f00001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1033.489974] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1033.489974] 19:56:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076002000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1033.532562] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1033.532562] 19:56:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000ffffff1f00000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:26 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000002000000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000746076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:27 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46429010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1033.764182] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1033.764182] [ 1033.850334] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1033.850334] 19:56:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000002000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000012bc2000000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1033.905074] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1033.905074] 19:56:27 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000bf76000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000003f00000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076002300000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000004000000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1034.473673] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1034.473673] [ 1034.486439] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1034.486439] [ 1034.507358] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1034.507358] 19:56:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000002000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:27 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100007a6076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:27 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4642a010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:27 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000003000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1034.867914] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1034.867914] [ 1034.884315] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1034.884315] [ 1034.894443] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1034.894443] [ 1034.943404] net_ratelimit: 8357 callbacks suppressed [ 1034.943417] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1034.962834] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1034.975514] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 19:56:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000004000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1034.989071] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1035.002125] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1035.015117] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1035.028992] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 19:56:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000005000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1035.042041] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1035.056588] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1035.070542] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1035.207452] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1035.207452] 19:56:28 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000002300001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:28 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4642b010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:28 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000005876000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000006000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076003f00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:28 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000fff6076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:28 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000007000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1035.637206] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1035.637206] [ 1035.882315] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1035.882315] [ 1035.908712] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1035.908712] 19:56:29 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4642c010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000008000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1036.032737] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1036.032737] [ 1036.044555] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1036.044555] 19:56:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076004000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:29 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000003f00001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000030100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1036.257006] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1036.257006] [ 1036.419393] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1036.419393] 19:56:29 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000008c76000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:29 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000050100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:29 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000002076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1036.696501] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1036.696501] [ 1036.706546] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1036.706546] 19:56:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000060100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:30 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4642d010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000004000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1036.913270] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1036.913270] 19:56:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076004800000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1036.958181] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1036.958181] [ 1036.963430] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1036.963430] 19:56:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000070100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:30 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4642e010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:30 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000bf76000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) [ 1037.094379] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1037.094379] [ 1037.163437] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1037.163437] 19:56:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000200100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1037.286336] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1037.286336] [ 1037.288600] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1037.288600] 19:56:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076004c00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1037.338390] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1037.338390] 19:56:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000004076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:30 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000003f0100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000004800001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1037.583007] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1037.583007] [ 1037.695207] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1037.695207] 19:56:31 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4642f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1037.897457] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1037.897457] [ 1037.911496] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1037.911496] 19:56:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076006000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000400100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:31 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000600a000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000fdef0100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1038.118239] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1038.118239] [ 1038.231574] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1038.231574] 19:56:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000effd0100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1038.389513] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1038.389513] 19:56:31 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46430010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1038.454826] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1038.454826] [ 1038.466324] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1038.466324] [ 1038.477049] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1038.477049] 19:56:31 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076006800000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:31 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000004000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:31 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000026076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:32 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000004c00001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000005000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000008000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1038.974165] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1038.974165] [ 1038.991853] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1038.991853] 19:56:32 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46431010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000040000000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:32 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006025000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:32 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000036076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1039.227602] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1039.227602] 19:56:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000050000000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000080000000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1039.558931] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1039.558931] [ 1039.571627] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1039.571627] [ 1039.583732] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1039.583732] 19:56:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076006c00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:32 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000020100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:33 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46432010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1039.899115] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1039.899115] 19:56:33 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000006000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000030100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1039.952902] net_ratelimit: 8162 callbacks suppressed [ 1039.952916] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1039.971103] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1039.984846] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1039.990860] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1039.990860] [ 1039.999426] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1040.020953] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1040.034055] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1040.047463] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1040.061327] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1040.075245] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1040.088830] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 19:56:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000040100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:33 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000046076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1040.198602] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1040.198602] 19:56:33 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060bf000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:33 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000006800001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000050100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000060100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:33 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000070100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1040.656403] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1040.656403] [ 1040.687347] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1040.687347] 19:56:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076007400000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000080100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:34 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46433010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000056076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:34 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000006c00001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1040.853144] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1040.853144] 19:56:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000300000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1041.076198] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1041.076198] [ 1041.090182] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1041.090182] 19:56:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076007a00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1041.254660] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1041.254660] [ 1041.294189] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1041.294189] 19:56:34 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000066076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:34 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000100000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000500000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:34 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000007400001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000b00000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:34 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46434010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1041.598331] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1041.598331] 19:56:34 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000f00000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000002000000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1041.776521] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1041.776521] 19:56:35 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076c0ed00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:35 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000100000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000076076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000003f00000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1041.985840] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1041.985840] 19:56:35 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000007a00001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:35 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46435010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000004000000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1042.299891] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1042.299891] [ 1042.307983] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1042.307983] 19:56:35 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000000200000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000200000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:35 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000086076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:35 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000c0ed00001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:35 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000300000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1042.643453] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1042.643453] 19:56:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076fff000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000400000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1042.883665] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1042.883665] 19:56:36 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46436010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:36 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076020000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000500000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1043.096064] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1043.096064] [ 1043.160979] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1043.160979] 19:56:36 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760fff00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:36 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000096076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000b00000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1043.300771] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1043.300771] [ 1043.310343] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1043.310343] 19:56:36 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fff000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000f00000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:36 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000005000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1043.751740] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1043.751740] [ 1043.786878] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1043.786878] 19:56:37 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46437010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:37 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076030000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000020bc120000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076f0ff00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000001fffffff00000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:37 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000b6076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1044.221853] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1044.221853] [ 1044.231109] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1044.231109] 19:56:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000102000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:37 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46438010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:37 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000fff00001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1044.453943] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1044.453943] 19:56:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000103000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:37 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000104000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1044.751731] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1044.751731] [ 1044.775266] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1044.775266] 19:56:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000105000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:38 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000f6076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1044.829853] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1044.829853] [ 1044.965221] net_ratelimit: 6850 callbacks suppressed [ 1044.965235] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1044.984923] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1045.000436] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1045.014432] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1045.028708] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1045.041158] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1045.053721] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1045.065847] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1045.078566] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1045.092412] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1045.312964] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1045.312964] 19:56:38 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076040000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000106000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:38 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46439010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:38 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000004000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1045.471264] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1045.471264] [ 1045.555273] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1045.555273] 19:56:38 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000107000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1045.603130] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1045.603130] 19:56:38 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000f0ff00001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000108000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100030000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100050000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1045.938314] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1045.938314] 19:56:39 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4643a010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1045.984837] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1045.984837] [ 1046.003952] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1046.003952] 19:56:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000236076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:39 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076050000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100060000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:39 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000010000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100070000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:39 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000002001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100200000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1046.288262] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1046.288262] [ 1046.315447] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1046.315447] 19:56:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001003f0000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1046.514076] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1046.514076] 19:56:39 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4643b010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:39 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100400000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1046.561074] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1046.561074] 19:56:39 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000486076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1046.689382] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1046.689382] 19:56:40 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000004001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076ffff1f000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:40 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076060000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001fdef0000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001effd0000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1046.978208] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1046.978208] [ 1046.988636] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1046.988636] 19:56:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000120010e00000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:40 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100004c6076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1047.211313] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1047.211313] [ 1047.226822] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1047.226822] 19:56:40 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4643c010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:40 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000010001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000120011300000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:40 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076070000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) [ 1047.523712] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1047.523712] 19:56:40 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100002000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000020000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000101e02000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1047.849211] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1047.849211] [ 1047.859233] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1047.859233] 19:56:41 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076080000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:41 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4643d010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000120013a00000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:41 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000686076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1048.022816] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1048.022816] 19:56:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000120014700000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000040000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1048.217959] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1048.217959] [ 1048.239935] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1048.239935] [ 1048.405946] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1048.405946] 19:56:41 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000ffff1f001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:41 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000001000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1048.609776] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1048.609776] 19:56:41 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4643e010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1048.698456] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1048.698456] 19:56:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000000000010020e001000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:42 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076090000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) [ 1048.822260] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1048.822260] 19:56:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000002000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000003000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:42 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46441010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1049.174236] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1049.174236] 19:56:42 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100006c6076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000060000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000004000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1049.350508] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1049.350508] [ 1049.352969] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1049.352969] 19:56:42 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000020001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000005000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:42 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000006000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1049.669400] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1049.669400] [ 1049.679913] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1049.679913] [ 1049.690055] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1049.690055] 19:56:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000007000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1049.713409] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1049.713409] 19:56:43 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000746076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:43 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760b0000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000008000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1049.973074] net_ratelimit: 7537 callbacks suppressed [ 1049.973088] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1049.991628] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1050.005983] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 19:56:43 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000040001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1050.021440] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1050.034055] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1050.047846] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) 19:56:43 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46442010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076ffff80000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000e0120000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1050.062235] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1050.075722] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1050.089542] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1050.104384] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 19:56:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100130120000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001003a0120000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1050.370044] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1050.370044] [ 1050.385212] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1050.385212] [ 1050.399571] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1050.399571] [ 1050.399885] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1050.399885] 19:56:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100470120000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:43 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000000000010000003f000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:43 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000060001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100007a6076000000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1050.789018] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1050.789018] 19:56:44 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760f0000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:44 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46443010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000010000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000040000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001fffffdef000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1051.183510] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1051.183510] [ 1051.194038] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1051.194038] [ 1051.197555] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1051.197555] 19:56:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001fffffff6000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1051.424074] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1051.424074] 19:56:44 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076100000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:44 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000100000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:44 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46444010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1051.511453] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1051.511453] 19:56:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001fffffdfc000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:44 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000ffff80001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:44 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001fffffffe000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1051.808370] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1051.808370] [ 1051.826243] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1051.826243] 19:56:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000020000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001effdffff000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001fcfdffff000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1052.078423] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 1052.078423] [ 1052.103118] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1052.103118] 19:56:45 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076020000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000030000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:45 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46445010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1052.130658] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1052.130658] 19:56:45 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076230000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001f6ffffff000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1052.399912] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1052.399912] 19:56:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001feffffff000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1052.523401] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1052.523401] [ 1052.564012] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1052.564012] 19:56:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000040000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:45 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000011000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:45 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100f0ffffff7f00000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000001000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000000000010000000020010e000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:46 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46446010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1052.998594] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1052.998594] 19:56:46 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076030000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1053.091557] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1053.091557] 19:56:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000200113000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000050000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1053.248097] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1053.248097] [ 1053.371932] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1053.371932] [ 1053.381419] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1053.381419] 19:56:46 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076480000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:46 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000021000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000020000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:46 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46447010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:46 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000000000010000000001e020000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000000000010000000020013a000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1053.886396] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1053.886396] 19:56:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000200147000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1053.963696] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1053.963696] [ 1054.063198] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1054.063198] 19:56:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000060000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1054.111233] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1054.111233] 19:56:47 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076040000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100007ffffffff0000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:47 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060764c0000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:47 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46448010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:47 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000031000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000010000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000020000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1054.598760] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1054.598760] [ 1054.617303] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1054.617303] [ 1054.641018] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1054.641018] 19:56:47 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000030000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1054.787716] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1054.787716] 19:56:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000040000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:48 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46449010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1054.927793] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1054.927793] [ 1054.980579] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1054.980579] [ 1054.982802] net_ratelimit: 8252 callbacks suppressed [ 1054.982815] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1055.008783] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 19:56:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000070000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:48 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000041000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1055.021907] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1055.034966] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1055.047840] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1055.060454] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1055.072738] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1055.085886] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1055.100156] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1055.113460] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1055.156334] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1055.156334] 19:56:48 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076050000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000050000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:48 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076600000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000060000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000070000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:48 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000080000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1055.542061] ieee802154 phy0 wpan0: encryption failed: -22 [ 1055.548660] ieee802154 phy1 wpan1: encryption failed: -22 [ 1055.607656] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1055.607656] 19:56:48 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4644a010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000003f0000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000051000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1055.723557] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1055.723557] 19:56:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000400000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1055.899418] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1055.899418] [ 1055.944772] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1055.944772] 19:56:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000080000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1055.986636] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1055.986636] 19:56:49 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076680000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076060000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000800000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:49 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4644b010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001fffffffffffffdef0000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000061000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000fffffff60000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:49 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000fffffdfc0000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1056.463150] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1056.463150] [ 1056.490419] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1056.490419] [ 1056.581932] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1056.581932] 19:56:49 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076070000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000090000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000fffffffe0000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1056.698453] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1056.698453] 19:56:50 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060766c0000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000ffffffff0000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1056.943708] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1056.943708] 19:56:50 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4644c010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000071000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1057.054460] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1057.054460] 19:56:50 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001effdffffffffffff0000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:50 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076740000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) [ 1057.334817] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1057.334817] [ 1057.347652] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1057.347652] 19:56:50 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000b0000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:50 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4644d010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000081000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1057.564021] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1057.564021] [ 1057.590008] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1057.590008] 19:56:51 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076080000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001ffffffffffffffff0000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1057.745205] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1057.745205] [ 1057.815530] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1057.815530] [ 1057.828577] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1057.828577] 19:56:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100020000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100030000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:51 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060767a0000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:51 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4644e010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000f0000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100040000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1058.297073] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1058.297073] 19:56:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000091000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:51 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076f00000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) [ 1058.401711] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1058.401711] 19:56:51 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100050000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1058.566950] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1058.566950] 19:56:51 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4644f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1058.647421] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1058.647421] [ 1058.680049] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1058.680049] 19:56:52 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076090000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100060000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000100000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1058.848791] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1058.848791] [ 1058.866553] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1058.866553] 19:56:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000b1000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100070000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:52 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000300000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100080000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:52 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46450010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1059.257864] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1059.257864] 19:56:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000300000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1059.578001] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1059.578001] 19:56:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000001f0000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:52 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000500000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000000f1000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1059.687962] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1059.687962] [ 1059.776480] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1059.776480] [ 1059.869645] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1059.869645] [ 1059.992538] net_ratelimit: 8589 callbacks suppressed [ 1059.992551] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1059.998090] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1059.998090] [ 1060.007460] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1060.033318] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1060.046248] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1060.060050] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1060.075107] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) 19:56:53 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760b0000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000600000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1060.088254] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1060.101731] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1060.113956] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1060.128819] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 19:56:53 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000500000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:53 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46451010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:53 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000200000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000700000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1060.428755] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1060.428755] 19:56:53 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000101000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:53 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100002000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1060.503749] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1060.503749] [ 1060.530823] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1060.530823] [ 1060.531864] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1060.531864] 19:56:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100003f00000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:54 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46452010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000230000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1060.752778] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1060.752778] [ 1060.778141] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1060.778141] 19:56:54 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000600000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:54 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760f0000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100004000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100fdef00000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1061.069121] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1061.069121] 19:56:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000001f1000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1061.261105] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1061.261105] 19:56:54 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46453010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1061.368766] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1061.368766] 19:56:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100effd00000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:54 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000700000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000003f0000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1061.544980] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1061.544980] 19:56:54 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000000000010020010e000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1061.618000] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1061.618000] [ 1061.679534] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1061.679534] [ 1061.695075] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1061.695075] 19:56:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100200113000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:55 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076100000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000201000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:55 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46454010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1061.945021] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1061.945021] 19:56:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000020000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000000000010001e020000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1062.302838] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1062.302838] 19:56:55 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000900000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000480000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1062.361455] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1062.361455] 19:56:55 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000000000010020013a000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000231000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1062.687442] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1062.687442] 19:56:56 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46455010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100200147000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076230000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1062.826265] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1062.826265] 19:56:56 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000b00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) [ 1062.892673] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1062.892673] 19:56:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000010000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000020e0010000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1063.100104] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1063.100104] [ 1063.161822] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1063.161822] 19:56:56 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46456010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:56 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000004c0000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000003f1000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000020000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1063.360310] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1063.360310] 19:56:56 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076480000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:56 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000030000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1063.595234] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1063.595234] 19:56:56 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46457010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000600000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1063.693304] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1063.693304] 19:56:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000481000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1063.837162] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1063.837162] 19:56:57 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000f00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000040000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1063.922865] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1063.922865] 19:56:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000050000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:57 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46458010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1064.187734] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1064.187734] 19:56:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000060000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000004c1000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1064.338427] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1064.338427] 19:56:57 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060764c0000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1064.378796] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1064.378796] [ 1064.389515] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1064.389515] 19:56:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000680000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:57 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000070000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1064.735272] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1064.735272] 19:56:58 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c46459010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000080000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000601000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:58 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076001f00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) [ 1064.891357] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1064.891357] 19:56:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000e01200000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1065.002125] net_ratelimit: 7561 callbacks suppressed [ 1065.002137] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1065.023753] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1065.036867] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1065.051409] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1065.064840] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1065.077477] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1065.089613] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1065.103057] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1065.116216] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1065.131732] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 19:56:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100001301200000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1065.291218] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.291218] [ 1065.310089] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.310089] 19:56:58 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645a010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1065.443830] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.443830] 19:56:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000006c0000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:58 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076600000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100003a01200000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000681000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:58 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100004701200000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1065.755047] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.755047] [ 1065.808100] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.808100] [ 1065.820652] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.820652] 19:56:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000003f0000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:59 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645b010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000400000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1065.974300] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1065.974300] 19:56:59 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076002000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:56:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000740000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100fffffdef0000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100fffffff60000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:59 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076680000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000006c1000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1066.320810] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1066.320810] 19:56:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100fffffdfc0000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1066.482666] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1066.482666] [ 1066.494354] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1066.494354] [ 1066.518837] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1066.518837] 19:56:59 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645c010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:56:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000007a0000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:56:59 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100fffffffe0000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000741000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100effdffff0000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1066.790644] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1066.790644] [ 1066.800677] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1066.800677] [ 1066.801660] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1066.801660] [ 1066.924361] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1066.924361] 19:57:00 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076002300000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:57:00 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645d010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:00 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060766c0000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100fcfdffff0000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100f6ffffff0000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607680f61c7b0000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:00 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100feffffff0000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1067.394362] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1067.394362] 19:57:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000007a1000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:00 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645e010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1067.670456] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1067.670456] 19:57:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000000000010000f0ffffff7f000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1067.764707] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1067.764707] [ 1067.778914] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1067.778914] 19:57:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a46533101000000607600000080f61c7b1000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:01 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076003f00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:57:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000010000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000020010e0000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1068.058880] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.058880] [ 1068.167929] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.167929] 19:57:01 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060767b1cf6800000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:01 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c464bf010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:01 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076740000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000002001130000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1068.282061] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.282061] 19:57:01 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076004000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:57:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000007b1cf6801000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1068.486411] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.486411] [ 1068.523096] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.523096] 19:57:01 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000200000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000001e0200000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1068.677667] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.677667] [ 1068.710466] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.710466] 19:57:02 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f020000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:02 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060767a0000000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076ffffff8c0000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1068.934659] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1068.934659] 19:57:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000020013a0000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:02 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076004800000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) [ 1069.127944] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.127944] [ 1069.142156] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.142156] 19:57:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000002001470000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000ffffff8c1000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000000000010000007ffffffff00000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1069.419737] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.419737] [ 1069.432758] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.432758] 19:57:02 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f030000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1069.460244] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.460244] 19:57:02 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000100000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000ffffff971000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1069.661015] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.661015] 19:57:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000300000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076ffffff970000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000200000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1069.813808] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1069.813808] 19:57:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000300000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:03 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076004c00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:57:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000400000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:03 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f040000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1070.017647] net_ratelimit: 7935 callbacks suppressed [ 1070.017661] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1070.035486] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1070.048127] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 19:57:03 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000000000edc01000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1070.060192] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1070.072547] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1070.084612] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1070.097473] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 19:57:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000500000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1070.110415] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1070.123466] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1070.135881] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) 19:57:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000600000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1070.286044] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1070.286044] [ 1070.295758] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1070.295758] [ 1070.370789] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1070.370789] [ 1070.374667] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1070.374667] [ 1070.481156] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1070.481156] 19:57:03 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f050000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a4653310100000060760000edc00000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:03 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000500000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000700000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:03 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffff01000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:03 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000800000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:04 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076006000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:57:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000003f00000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000004000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1071.069432] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.069432] 19:57:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000008000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1071.134923] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.134923] 19:57:04 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100fffffffffffffdef00000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:04 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffff41000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:04 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f060000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1071.388640] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.388640] [ 1071.399503] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.399503] [ 1071.410111] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.410111] 19:57:04 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076fffffff00000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1071.755994] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1071.755994] 19:57:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000600000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:05 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076006800000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:57:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000000000010000000000fffffff600000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffff51000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:05 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f070000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000000000010000000000fffffdfc00000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1072.008229] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1072.008229] [ 1072.029681] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1072.029681] [ 1072.055763] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1072.055763] [ 1072.108613] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1072.108613] 19:57:05 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000700000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000000000010000000000fffffffe00000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1072.298936] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1072.298936] 19:57:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076fffffff40000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:05 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076006c00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:57:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b00000000200000000000000200000000000000010000000000ffffffff00000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffff61000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1072.542331] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1072.542331] 19:57:05 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100effdffffffffffff00000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:05 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f080000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1072.686464] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1072.686464] 19:57:06 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000900000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100ffffffffffffffff00000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076fffffff50000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1072.941545] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1072.941545] [ 1073.009139] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1073.009139] 19:57:06 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffffb1000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000200000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:06 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f090000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1073.195093] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1073.195093] [ 1073.216871] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1073.216871] [ 1073.231392] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1073.231392] 19:57:06 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076007400000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:57:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000300000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:06 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000400000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1073.551819] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1073.551819] 19:57:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076fffffff60000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:07 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffdfc1000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:07 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000b00000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:07 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0c0000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1073.785333] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1073.785333] 19:57:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000500000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1073.919942] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1073.919942] [ 1073.981619] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1073.981619] 19:57:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076fffffffb0000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1074.111654] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1074.111654] [ 1074.130848] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1074.130848] 19:57:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000600000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:07 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffdfd1000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1074.276795] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1074.276795] 19:57:07 executing program 1: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076007a00000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec000000", 0x9b, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b0000000060000000", 0x1d, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012", 0x15, 0xb4e0}], 0x0, &(0x7f0000061000)) 19:57:07 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f0f0000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000700000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000800000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000003000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:07 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000005000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:08 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x8, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000f00000000001000000c00030000020000090000000020000000090040000000", 0x2b, 0x8000}, {0x0}, {0x0}, {0x0, 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000", 0x2c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900000000000000", 0x34, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1074.673940] ERROR: (device loop4): xtSearch: XT_GETPAGE: xtree page corrupt [ 1074.673940] [ 1074.690668] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1074.690668] 19:57:08 executing program 5: ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c", 0x15, 0x8000}, {&(0x7f0000010f00)="10c4645f100000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}], 0x0, &(0x7f0000061000)) 19:57:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000fffffffd1000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001", 0x29, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012", 0x15, 0xb2e0}], 0x0, &(0x7f0000061000)) [ 1075.022116] net_ratelimit: 8121 callbacks suppressed [ 1075.022129] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1075.040133] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1075.053385] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) 19:57:08 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x6, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076fffffffd0000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) 19:57:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000006000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1075.066393] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1075.078807] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1075.090954] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1075.104220] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1075.117042] bridge0: received packet on veth1_to_bridge with own address as source address (addr:aa:aa:aa:aa:aa:0c, vlan:0) [ 1075.129222] bridge0: received packet on bridge_slave_1 with own address as source address (addr:aa:aa:aa:aa:aa:1c, vlan:0) [ 1075.143507] bridge0: received packet on veth1_to_bridge with own address as source address (addr:7a:4f:c3:1a:25:72, vlan:0) [ 1075.225358] ERROR: (device loop1): xtSearch: XT_GETPAGE: xtree page corrupt [ 1075.225358] [ 1075.244284] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 1075.244284] 19:57:08 executing program 0: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(0x0, 0x1612c2, 0x0) write$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0xda00) ioctl$PERF_EVENT_IOC_PERIOD(0xffffffffffffffff, 0x40082404, &(0x7f0000000000)=0x8000) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000740)=0x0) perf_event_open(&(0x7f00000006c0)={0x4, 0x80, 0x9, 0x1, 0x7, 0x92, 0x0, 0x0, 0xc604, 0x7, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x2, @perf_bp={&(0x7f00000000c0), 0x3}, 0x4000, 0x46, 0x6, 0x6, 0xffffffff, 0xa1d4, 0x2, 0x0, 0x7, 0x0, 0x3}, r2, 0x9, r1, 0x9) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x32, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000090040000000000000000004000000180000000200000016000000340700000100000000010000000f000034000000cc0e000010c4645f00000000320000000000000000000000000000000000000000000000000000000000000000000000000000009093950c4e4f40b5baeaf51d76ba1aec00"/165, 0xa5, 0x8000}, {0x0, 0x0, 0x9800}, {0x0, 0x0, 0xaa00}, {0x0, 0x0, 0xac00}, {&(0x7f0000010e00), 0x0, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000007000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/56, 0x38, 0xb4e0}, {&(0x7f0000011300), 0x0, 0xb600}, {0x0, 0x0, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {0x0, 0x0, 0xd000}, {&(0x7f0000011800)="00000000000000000000000000000000830003001200", 0x16, 0xd0e0}, {0x0}, {&(0x7f0000013900)="10c4645f010000000100000001", 0xd, 0x18200}, {&(0x7f0000013a00), 0x0, 0x182e0}, {&(0x7f0000014700), 0x0, 0x1c400}, {0x0}, {0x0, 0x0, 0xf01000}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000061000)) [ 1075.272105] ERROR: (device loop5): xtSearch: XT_GETPAGE: xtree page corrupt [ 1075.272105] [ 1075.321726] BUG: unable to handle kernel paging request at ffffffffffffff80 [ 1075.329164] PGD 9e6e067 P4D 9e6e067 PUD 9e70067 PMD 0 [ 1075.335470] Oops: 0000 [#1] PREEMPT SMP KASAN [ 1075.340095] CPU: 0 PID: 30456 Comm: syz-executor.5 Not tainted 4.19.192-syzkaller #0 [ 1075.348449] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 1075.358374] RIP: 0010:diFree+0x141/0x29c0 [ 1075.362908] Code: 28 48 8d 78 80 48 89 44 24 10 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 13 22 00 00 48 8b 44 24 10 <48> 8b 68 80 48 8b 44 24 18 4c 8d 6d 04 48 c1 e8 0c 4c 89 ea 48 c1 [ 1075.383542] RSP: 0018:ffff888042887930 EFLAGS: 00010246 [ 1075.389712] RAX: 0000000000000000 RBX: ffff888097c75080 RCX: ffffc90010694000 [ 1075.397455] RDX: 1ffffffffffffff0 RSI: ffffffff8274ca62 RDI: ffffffffffffff80 [ 1075.405149] RBP: ffff88804802cb28 R08: 0000000000000000 R09: 0000000000000000 [ 1075.412907] R10: 0000000000000001 R11: 0000000000000000 R12: ffff88804802cb28 [ 1075.420823] R13: ffff88804802cb50 R14: ffffffff889ad9c0 R15: ffff888035cdd1b8 [ 1075.428342] FS: 00007f193cee5700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 1075.437176] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1075.443550] CR2: ffffffffffffff80 CR3: 000000008eddb000 CR4: 00000000001406f0 [ 1075.451131] DR0: 0000000000000003 DR1: 0000000000000000 DR2: 0000000000000000 [ 1075.459601] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1075.467455] Call Trace: [ 1075.470149] ? mark_held_locks+0xf0/0xf0 [ 1075.474937] ? do_syscall_64+0xf9/0x620 [ 1075.479212] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.485212] ? do_read_cache_page+0xfe/0x1170 [ 1075.490070] ? lock_acquire+0x170/0x3c0 [ 1075.494242] ? __dquot_initialize+0x298/0xb70 [ 1075.499084] ? pagevec_lookup_range_tag+0x3b/0x80 [ 1075.504310] ? __inode_wait_for_writeback+0x184/0x1f0 [ 1075.510354] ? dquot_initialize_needed+0x290/0x290 [ 1075.515883] ? diWrite+0x13c0/0x13c0 [ 1075.519898] ? lock_downgrade+0x720/0x720 [ 1075.524339] jfs_evict_inode+0x126/0x170 [ 1075.528802] ? jfs_write_inode+0x1d0/0x1d0 [ 1075.533229] evict+0x2ed/0x760 [ 1075.536619] iput+0x4f1/0x860 [ 1075.539869] diFreeSpecial+0x63/0x80 [ 1075.544283] jfs_mount+0x23f/0x3d0 [ 1075.551145] jfs_fill_super+0x55c/0xb50 [ 1075.555550] ? parse_options+0xe70/0xe70 [ 1075.560648] ? set_blocksize+0x163/0x3f0 [ 1075.564832] mount_bdev+0x2fc/0x3b0 [ 1075.568494] ? parse_options+0xe70/0xe70 [ 1075.572569] mount_fs+0xa3/0x310 [ 1075.576136] vfs_kern_mount.part.0+0x68/0x470 [ 1075.581464] do_mount+0x113c/0x2f10 [ 1075.585566] ? cmp_ex_sort+0xc0/0xc0 [ 1075.589383] ? __do_page_fault+0x180/0xd60 [ 1075.593991] ? copy_mount_string+0x40/0x40 [ 1075.598533] ? memset+0x20/0x40 [ 1075.602633] ? copy_mount_options+0x26f/0x380 [ 1075.608222] ksys_mount+0xcf/0x130 [ 1075.611787] __x64_sys_mount+0xba/0x150 [ 1075.615969] ? lockdep_hardirqs_on+0x3a8/0x5c0 [ 1075.624572] do_syscall_64+0xf9/0x620 [ 1075.628748] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 1075.634962] RIP: 0033:0x467afa [ 1075.638164] Code: 48 c7 c2 bc ff ff ff f7 d8 64 89 02 b8 ff ff ff ff eb d2 e8 b8 04 00 00 0f 1f 84 00 00 00 00 00 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1075.658948] RSP: 002b:00007f193cee4fa8 EFLAGS: 00000202 ORIG_RAX: 00000000000000a5 [ 1075.668047] RAX: ffffffffffffffda RBX: 0000000020000200 RCX: 0000000000467afa [ 1075.675862] RDX: 0000000020000000 RSI: 0000000020000100 RDI: 00007f193cee5000 [ 1075.683591] RBP: 00007f193cee5040 R08: 00007f193cee5040 R09: 0000000020000000 [ 1075.691820] R10: 0000000000000000 R11: 0000000000000202 R12: 0000000020000000 [ 1075.700207] R13: 0000000020000100 R14: 00007f193cee5000 R15: 0000000020061000 [ 1075.708310] Modules linked in: [ 1075.712769] CR2: ffffffffffffff80 [ 1075.716891] ---[ end trace 6bc2f255be5a4d4c ]--- [ 1075.722749] RIP: 0010:diFree+0x141/0x29c0 [ 1075.727642] Code: 28 48 8d 78 80 48 89 44 24 10 48 b8 00 00 00 00 00 fc ff df 48 89 fa 48 c1 ea 03 80 3c 02 00 0f 85 13 22 00 00 48 8b 44 24 10 <48> 8b 68 80 48 8b 44 24 18 4c 8d 6d 04 48 c1 e8 0c 4c 89 ea 48 c1 [ 1075.748392] RSP: 0018:ffff888042887930 EFLAGS: 00010246 [ 1075.754297] RAX: 0000000000000000 RBX: ffff888097c75080 RCX: ffffc90010694000 [ 1075.762280] RDX: 1ffffffffffffff0 RSI: ffffffff8274ca62 RDI: ffffffffffffff80 [ 1075.770448] RBP: ffff88804802cb28 R08: 0000000000000000 R09: 0000000000000000 [ 1075.778381] R10: 0000000000000001 R11: 0000000000000000 R12: ffff88804802cb28 [ 1075.787199] R13: ffff88804802cb50 R14: ffffffff889ad9c0 R15: ffff888035cdd1b8 [ 1075.796022] FS: 00007f193cee5700(0000) GS:ffff8880ba000000(0000) knlGS:0000000000000000 [ 1075.805269] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1075.812036] CR2: ffffffffffffff80 CR3: 000000008eddb000 CR4: 00000000001406f0 [ 1075.820215] DR0: 0000000000000003 DR1: 0000000000000000 DR2: 0000000000000000 [ 1075.828519] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 1075.837456] Kernel panic - not syncing: Fatal exception [ 1075.844945] Kernel Offset: disabled [ 1075.849605] Rebooting in 86400 seconds..