x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) [ 638.113863][T13413] loop1: detected capacity change from 0 to 61456 11:51:11 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 638.364447][T13421] loop2: detected capacity change from 0 to 208 [ 638.513063][T13393] jfs_mount: dbMount failed w/rc = -5 [ 638.524208][T13421] jfs_mount: diMount failed w/rc = -5 [ 638.537113][T13393] Mount JFS Failure: -5 [ 638.550845][T13421] Mount JFS Failure: -5 [ 638.556749][T13393] jfs_mount failed w/return code = -5 [ 638.579938][T13421] jfs_mount failed w/return code = -5 11:51:11 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:11 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)}, 0x0) recvmmsg(r1, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001700)=""/221, 0xdd}], 0x1}}], 0x1, 0x0, 0x0) 11:51:11 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {&(0x7f0000010100), 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/98, 0x62, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010000000", 0x30, 0xb4e0}, {0x0}, {0x0}, {&(0x7f0000013a00)}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) syz_emit_ethernet(0x36, 0x0, 0x0) 11:51:11 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001700)=""/221, 0xdd}], 0x1}}], 0x1, 0x0, 0x0) [ 638.871470][T13429] loop1: detected capacity change from 0 to 61456 11:51:11 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001700)=""/221, 0xdd}], 0x1}}], 0x1, 0x0, 0x0) [ 639.073112][T13439] loop2: detected capacity change from 0 to 208 [ 639.113962][T13429] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 639.161335][T13437] loop3: detected capacity change from 0 to 61456 [ 639.178278][T13429] Mount JFS Failure: -5 [ 639.200402][T13429] jfs_mount failed w/return code = -5 11:51:12 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001700)=""/221, 0xdd}], 0x1}}], 0x1, 0x0, 0x0) [ 639.296157][T13439] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 639.296157][T13439] 11:51:12 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {&(0x7f0000010100), 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/98, 0x62, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010000000", 0x30, 0xb4e0}, {0x0}, {0x0}, {&(0x7f0000013a00)}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) syz_emit_ethernet(0x36, 0x0, 0x0) [ 639.427502][T13439] ERROR: (device loop2): remounting filesystem as read-only [ 639.434993][T13439] xtLookup: xtSearch returned -5 [ 639.466937][T13437] jfs_mount: dbMount failed w/rc = -5 [ 639.494789][T13439] read_mapping_page failed! [ 639.506785][T13437] Mount JFS Failure: -5 [ 639.538005][T13437] jfs_mount failed w/return code = -5 [ 639.539332][T13439] jfs_mount: diMount(ipaimap) failed w/rc = -5 11:51:12 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 639.637379][T13439] Mount JFS Failure: -5 [ 639.656871][T13439] jfs_mount failed w/return code = -5 11:51:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001700)=""/221, 0xdd}], 0x1}}], 0x1, 0x0, 0x0) 11:51:12 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 639.784137][T13449] loop1: detected capacity change from 0 to 61456 11:51:12 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) [ 639.948267][T13449] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 639.975525][T13449] Mount JFS Failure: -5 11:51:12 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001700)=""/221, 0xdd}], 0x1}}], 0x1, 0x0, 0x0) [ 640.015700][T13449] jfs_mount failed w/return code = -5 11:51:13 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {&(0x7f0000010100), 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/98, 0x62, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010000000", 0x30, 0xb4e0}, {0x0}, {0x0}, {&(0x7f0000013a00)}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) syz_emit_ethernet(0x36, 0x0, 0x0) [ 640.157092][T13460] loop2: detected capacity change from 0 to 208 [ 640.285193][T13458] loop3: detected capacity change from 0 to 61456 [ 640.353847][T13460] jfs_mount: diMount failed w/rc = -5 11:51:13 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000001b40)=[{&(0x7f0000001700)=""/221, 0xdd}], 0x1}}], 0x1, 0x0, 0x0) [ 640.447828][T13460] Mount JFS Failure: -5 [ 640.483471][T13460] jfs_mount failed w/return code = -5 11:51:13 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) [ 640.556101][T13465] loop1: detected capacity change from 0 to 61456 11:51:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 640.752227][T13458] jfs_mount: dbMount failed w/rc = -5 [ 640.791198][T13458] Mount JFS Failure: -5 [ 640.833855][T13458] jfs_mount failed w/return code = -5 [ 640.862186][T13465] jfs_mount: diMount(ipaimap2) failed, rc = -5 11:51:13 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 640.890203][T13465] Mount JFS Failure: -5 [ 640.894866][T13465] jfs_mount failed w/return code = -5 11:51:13 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {0x0, 0x0, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 641.178574][T13472] loop2: detected capacity change from 0 to 208 11:51:14 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {&(0x7f0000010100), 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/98, 0x62, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010000000", 0x30, 0xb4e0}, {0x0}, {0x0}, {&(0x7f0000013a00)}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[], 0x0) 11:51:14 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 641.447038][T13472] jfs_mount: diMount failed w/rc = -5 [ 641.525496][T13472] Mount JFS Failure: -5 [ 641.578336][T13472] jfs_mount failed w/return code = -5 11:51:14 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) [ 641.669778][T13480] loop3: detected capacity change from 0 to 61456 [ 641.693989][T13484] loop1: detected capacity change from 0 to 61456 11:51:14 executing program 5: r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:14 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) [ 641.996687][T13484] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 642.005598][T13484] Mount JFS Failure: -5 [ 642.109218][T13480] jfs_mount: dbMount failed w/rc = -5 [ 642.127502][T13484] jfs_mount failed w/return code = -5 [ 642.163027][T13480] Mount JFS Failure: -5 11:51:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x0, 0x0, 0x0) [ 642.187900][T13480] jfs_mount failed w/return code = -5 11:51:15 executing program 1: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xb, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc", 0x55, 0x8000}, {&(0x7f0000010100), 0x0, 0x9000}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020", 0x1a, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900", 0x2e, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/98, 0x62, 0xb400}, {&(0x7f0000011200)="000000000000000000000000000000008300030012000000000000000000000000000000000000000600000010000000", 0x30, 0xb4e0}, {0x0}, {0x0}, {&(0x7f0000013a00)}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[], 0x0) [ 642.301880][T13494] loop2: detected capacity change from 0 to 208 11:51:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x0, 0x0, 0x0) 11:51:15 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {0x0, 0x0, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:15 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 642.731340][T13494] jfs_mount: diMount failed w/rc = -5 [ 642.754055][T13500] loop1: detected capacity change from 0 to 61456 [ 642.778522][T13494] Mount JFS Failure: -5 [ 642.821799][T13494] jfs_mount failed w/return code = -5 11:51:15 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001cc0), 0x0, 0x0, 0x0) 11:51:15 executing program 5: r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:16 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) [ 643.073537][T13500] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 643.116024][T13507] loop3: detected capacity change from 0 to 61456 [ 643.164474][T13500] Mount JFS Failure: -5 11:51:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 643.206817][T13500] jfs_mount failed w/return code = -5 [ 643.419064][T13507] jfs_mount: dbMount failed w/rc = -5 [ 643.441701][T13507] Mount JFS Failure: -5 [ 643.462527][T13507] jfs_mount failed w/return code = -5 [ 643.478923][T13517] loop2: detected capacity change from 0 to 208 11:51:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) [ 643.559054][T13517] jfs_mount: diMount failed w/rc = -5 11:51:16 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {0x0, 0x0, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 643.602465][T13517] Mount JFS Failure: -5 [ 643.672299][T13517] jfs_mount failed w/return code = -5 11:51:16 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, 0x0, 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:16 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001cc0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 11:51:16 executing program 1: syz_emit_ethernet(0x6e, &(0x7f00000000c0)={@multicast, @link_local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x38, 0x3a, 0x0, @private0, @mcast2, {[], @dest_unreach={0x1, 0x0, 0x0, 0x0, '\x00', {0x0, 0x6, "011700", 0x0, 0x2f, 0x0, @mcast1, @private0, [@hopopts]}}}}}}}, 0x0) 11:51:16 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:16 executing program 5: r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:16 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='cdg\x00', 0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x900}, 0x1c) [ 644.010760][T13524] loop3: detected capacity change from 0 to 61456 11:51:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000001b40)}}], 0x1, 0x0, 0x0) [ 644.298543][T13534] loop2: detected capacity change from 0 to 208 [ 644.306770][ T26] audit: type=1400 audit(1639309877.220:269): avc: denied { name_bind } for pid=13532 comm="syz-executor.1" src=2 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:reserved_port_t tclass=tcp_socket permissive=1 [ 644.336217][T13524] jfs_mount: dbMount failed w/rc = -5 [ 644.394177][T13524] Mount JFS Failure: -5 [ 644.430275][T13524] jfs_mount failed w/return code = -5 11:51:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000001b40)}}], 0x1, 0x0, 0x0) [ 644.591438][T13534] jfs_mount: diMount failed w/rc = -5 [ 644.620610][T13534] Mount JFS Failure: -5 [ 644.645474][T13534] jfs_mount failed w/return code = -5 11:51:17 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:17 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000001b40)}}], 0x1, 0x0, 0x0) 11:51:17 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:17 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100), 0x0, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000001b40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 11:51:18 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 645.197228][T13549] loop2: detected capacity change from 0 to 208 [ 645.275696][T13549] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 645.275696][T13549] 11:51:18 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect={0x0, 0x5517, 0x48000000}) ioctl$USBDEVFS_IOCTL(r0, 0x8108551b, &(0x7f0000000380)) close_range(r0, 0xffffffffffffffff, 0x0) 11:51:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000001b40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) [ 645.349126][T13551] loop3: detected capacity change from 0 to 61456 [ 645.358622][T13549] ERROR: (device loop2): remounting filesystem as read-only [ 645.366380][T13549] xtLookup: xtSearch returned -5 [ 645.372710][T13549] read_mapping_page failed! [ 645.446903][T13549] jfs_mount: dbMount failed w/rc = -5 [ 645.490581][T13549] Mount JFS Failure: -5 [ 645.507598][T13549] jfs_mount failed w/return code = -5 [ 645.531395][T13551] jfs_mount: dbMount failed w/rc = -5 [ 645.545822][T13551] Mount JFS Failure: -5 [ 645.552724][T13551] jfs_mount failed w/return code = -5 11:51:18 executing program 0: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f0000000000)={0x26, 'skcipher\x00', 0x0, 0x0, 'cbc(camellia)\x00'}, 0x58) r1 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f0000000200)="ad56b6cc0400aeb995298992ea5400c2", 0x10) sendmsg$alg(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000080)="b764f40a652106d7ae62ba998844dbcb074bbe6388518d0220561504850935604b04f8bc21e80eab5725cc2d5aa591c5f3b96a46bc0377328a1047df8aeabbdf0b62feab2a25090007c7bf356842078c94392dc53fd21e2593358a4ffcc3317f3ad6d453b2f71662ce7b6bf7f611714636ef6c320c813f4b30f28d6c9f00444b05d33531678126e3995a84ca2abc66efff9592698f287d0f1978a65aa9183abddaafc4865142fdcc72385105f548e3e7b2d524279c30802c94d815c41bc90c3e277485e116bb27f4cbb01408cdc75445056a0629e1880e938570b8dc070d", 0xde}], 0x1, &(0x7f00000002c0)=[@op={0x18, 0x117, 0x3, 0x1}], 0x18}, 0x0) recvmmsg(r1, &(0x7f0000001cc0)=[{{0x0, 0x0, &(0x7f0000001b40)=[{0x0}], 0x1}}], 0x1, 0x0, 0x0) 11:51:18 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:18 executing program 1: r0 = syz_open_dev$usbfs(&(0x7f0000000180), 0x77, 0x1) ioctl$USBDEVFS_IOCTL(r0, 0xc0105512, &(0x7f0000000040)=@usbdevfs_connect={0x0, 0x5517, 0x48000000}) ioctl$USBDEVFS_IOCTL(r0, 0x8108551b, &(0x7f0000000380)) close_range(r0, 0xffffffffffffffff, 0x0) 11:51:18 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000d84000)={0xa, 0x2}, 0x1c) setsockopt$inet6_tcp_int(r0, 0x6, 0xa, &(0x7f0000000080)=0x4, 0x4) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000000c0)='cdg\x00', 0x4) sendto$inet6(r0, &(0x7f0000f6f000), 0xfffffffffffffea7, 0x20000004, &(0x7f0000b63fe4)={0xa, 0x2, 0x983a, @rand_addr, 0x900}, 0x1c) socket$inet6(0xa, 0x1, 0x8010000000000084) [ 645.841138][T13568] hub 9-0:1.0: USB hub found [ 645.864441][T13568] hub 9-0:1.0: 8 ports detected 11:51:18 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:18 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100), 0x0, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 645.968383][T13569] loop2: detected capacity change from 0 to 208 11:51:19 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 646.129117][ T26] audit: type=1400 audit(1639309879.050:270): avc: denied { create } for pid=13573 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 11:51:19 executing program 1: r0 = syz_open_dev$sndctrl(&(0x7f0000000080), 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_WRITE(r0, 0xc4c85513, &(0x7f0000000cc0)={{0x5, 0x0, 0x0, 0x0, 'syz1\x00'}, 0x0, [0x1, 0x5]}) [ 646.339427][T13569] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 646.339427][T13569] [ 646.442478][T13569] ERROR: (device loop2): remounting filesystem as read-only [ 646.504330][T13569] xtLookup: xtSearch returned -5 11:51:19 executing program 1: r0 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) [ 646.560865][T13569] read_mapping_page failed! [ 646.616656][T13569] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 646.638899][T13569] Mount JFS Failure: -5 [ 646.650557][T13569] jfs_mount failed w/return code = -5 [ 646.718188][T13580] loop3: detected capacity change from 0 to 61456 11:51:19 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:19 executing program 0: r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000900), 0x0, 0x0) getsockname$netlink(r0, 0x0, 0x0) 11:51:19 executing program 1: r0 = shmget$private(0x0, 0x1000, 0x54001800, &(0x7f0000fff000/0x1000)=nil) shmat(r0, &(0x7f0000000000/0x4000)=nil, 0xffffffffffff6fff) [ 646.975607][T13580] jfs_mount: dbMount failed w/rc = -5 [ 647.003767][T13580] Mount JFS Failure: -5 11:51:19 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340), 0x0) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 647.039850][T13580] jfs_mount failed w/return code = -5 11:51:20 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000011c0)={&(0x7f0000000100)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@const]}}, &(0x7f00000001c0)=""/4096, 0x26, 0x1000, 0x1}, 0x20) 11:51:20 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f00000011c0)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 647.224097][T13591] loop2: detected capacity change from 0 to 208 11:51:20 executing program 5: prlimit64(0x0, 0x0, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:20 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100), 0x0, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:20 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004480)=[{{&(0x7f0000000000)={0xa, 0x4e24, 0x0, @loopback}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f00000023c0)="81", 0x1}], 0x1}}], 0x2, 0x8044) 11:51:20 executing program 0: io_uring_setup(0x3bb6, &(0x7f0000000140)={0x0, 0x0, 0x6}) [ 647.550129][T13591] jfs_mount: diMount failed w/rc = -5 [ 647.563832][T13591] Mount JFS Failure: -5 [ 647.576731][T13591] jfs_mount failed w/return code = -5 11:51:20 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) [ 647.749682][ T26] audit: type=1400 audit(1639309880.670:271): avc: denied { sqpoll } for pid=13608 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=io_uring permissive=1 11:51:20 executing program 1: r0 = syz_open_dev$mouse(&(0x7f00000005c0), 0x0, 0x0) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x0, 0x40010, r0, 0x8000000) 11:51:20 executing program 0: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r0, &(0x7f0000000080)='.dead\x00', &(0x7f00000000c0)=@secondary) [ 647.912319][T13609] loop3: detected capacity change from 0 to 61456 [ 648.043629][ T26] audit: type=1400 audit(1639309880.960:272): avc: denied { read } for pid=13613 comm="syz-executor.1" name="mouse0" dev="devtmpfs" ino=837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 11:51:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb6", 0x56) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 648.129286][T13609] jfs_mount: dbMount failed w/rc = -5 11:51:21 executing program 0: syz_emit_ethernet(0x4a, &(0x7f0000000180)={@random="df979495d0f6", @broadcast, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "1d37a8", 0x14, 0x6, 0x0, @local, @mcast2, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 11:51:21 executing program 1: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, 0x0, 0x0, 0xffffffffffffffff) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000080)=' ', 0x1, 0xfffffffffffffffe) [ 648.173390][T13609] Mount JFS Failure: -5 [ 648.188232][T13614] loop2: detected capacity change from 0 to 208 [ 648.189154][T13609] jfs_mount failed w/return code = -5 [ 648.211519][ T26] audit: type=1400 audit(1639309880.960:273): avc: denied { open } for pid=13613 comm="syz-executor.1" path="/dev/input/mouse0" dev="devtmpfs" ino=837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 11:51:21 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb6", 0x56) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:21 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000380)={&(0x7f0000000280), 0xc, &(0x7f0000000340)={&(0x7f00000002c0)={0x14, r1, 0x1}, 0x14}}, 0x0) [ 648.450938][ T26] audit: type=1400 audit(1639309881.030:274): avc: denied { write } for pid=13616 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:system_r:kernel_t tclass=key permissive=1 11:51:21 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c464", 0x3b, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_int(r0, 0x29, 0x51, 0x0, &(0x7f0000000640)) [ 648.563505][T13614] jfs_mount: diMount failed w/rc = -5 [ 648.586028][T13614] Mount JFS Failure: -5 [ 648.607265][T13614] jfs_mount failed w/return code = -5 11:51:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb6", 0x56) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:21 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:21 executing program 1: r0 = add_key$keyring(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffe) add_key$user(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x2}, &(0x7f0000000100)="01", 0x1, r0) keyctl$search(0xa, r0, &(0x7f0000000140)='dns_resolver\x00', &(0x7f0000000180)={'syz', 0x2}, 0x0) 11:51:21 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000200), 0x0, 0x0) ioctl$RTC_IRQP_READ(r0, 0x8008700b, &(0x7f0000000240)) syz_genetlink_get_family_id$devlink(0x0, 0xffffffffffffffff) 11:51:21 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c73", 0x81) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:21 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCGETTUNNEL(r0, 0x89f0, &(0x7f0000000940)={'sit0\x00', &(0x7f00000008c0)={'sit0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private1={0xfc, 0x1, '\x00', 0x1}, @mcast1}}) [ 649.049024][T13638] loop3: detected capacity change from 0 to 61456 [ 649.123250][ T26] audit: type=1400 audit(1639309882.040:275): avc: denied { read } for pid=13641 comm="syz-executor.0" name="rtc0" dev="devtmpfs" ino=835 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 11:51:22 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003480)={0x18, 0x3, &(0x7f0000003300)=@raw=[@map, @exit], &(0x7f0000003380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:51:22 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 649.354774][ T26] audit: type=1400 audit(1639309882.040:276): avc: denied { open } for pid=13641 comm="syz-executor.0" path="/dev/rtc0" dev="devtmpfs" ino=835 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 11:51:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c73", 0x81) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:22 executing program 1: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000004680)={0x2020, 0x0, 0x0, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000002300)={0x50, 0x0, r1}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000000000)="9eda438838743bd4e9720bee57093515dc189a5ea685e9556c1c2c3cfc4df50d66d31a48aa312663b68d18c5826b5b55fb738208863dac0f10f423aee7a5d8ddc45ebdfeb7424bae859d7c37ecfc4b63914d5a56d91017dd22bc84f759a15969951aef9d5c88c96560896988fa18cd946cfcc3a0f1c993348377904eac32c980bdf7976ebca2b499cab63c4e841514277fc71d4620e29a92523402485de0e82896484c0ae497a4d686df23ca7b68c3fd5e624d3510d7f94838e54af877ca58a00c5a672bba11f5aa1ed1980dfef47b9973d0bf456ded5e72f1702b3dc5197fce39cba53a038d8dc0ec783ce70577107dc5e8b299e64a0b7f1191f0926bd25762370191710bab2f44e9069f55f8a3f87e4cb488a2fb3348c0bf3b3874291f83e4776b160ea73aafa3919c7c069c73c0052173a63158db8b65541d161f9c964926ad7f06bdd6cb6a32135b04e35701c2e13c49c1f75dc7a25d623378860692d172ec3f1e1f2d9dc77c015c13721efcb101c2390abb847e871132f472a37cc0163b39b1d575a5444e246a08a1afb1a696cabab29498a314429a3b9f44c43ba29f71fac1fbe0d01c3c16d22730932704bcfb0c1b7a432bc51dd3f5dd5afc3b342cbe6a6ff899039e28f9a51881b1d46fdcf31767cb6f5c5c69ab3c80615d77c4d1664fc4ec831b8cea2e752bbb7a9ce79df875b29f1e232751daf32a1a0c4ff8bd0688e2b8e2d668b8a77e20a9eb6ec2e2c23b94e507baeacbcfa31fb6e1ca3343668f43e3aa6d85e7c29bf0bb4dbdabddc92be7f4a6f5d21b19e6da17bfb6cc926e3847532fae29c7b62fb909130ec372d3c16cfe6aaf3ce2af0fe7610fde7aad61bc80d2f96b999c8ccf6d22cf903ca8ae8b879ec4a416f334982e9810c0140a18d4dc81b5edaae23e9f4abaf40ed71512aebbba5bb251545e188db789558a845a2877b14bdaeec3c738b7d730c0860531bf5517d4f0e8f95ed3571f8a35816d5116fcb8d7cbf42b7d5d5e65541508c898bb2e0fe96297d2ab7135662de39df099ebaed5871111f5346278cee5728cec512e6c0a0d65b51e3d627873195b84103341c2bc83b6c8fdd8ba17f5957413f61c69d618c9b9d0b1f08dc81921b6c662ee1da3bfa019b095e9a03c2db4d645ccb7364e895098cbf7d932c72d80663c7a1694d122f7348393079223c11d36c64a5856eae0397ab9a9d948204b74e56525a9d552dd0916de81cbb5af3c59b3d7f8f9154423ce2cb45a5bc808e24bef13212019a19545fe54ba84d01534358380192b8c7b0eda907810375bb66a578a58fec392b47991271c8367b91d710e8a176bc1a4e96f0e137d4c25fbb03eddc392f9f170dd744472b864fbbae7c93d86e682308b21b73c5652065d72cf02e1152b44024a90a3b52eb0bb3cb412e518d37a68aa4c7f46789c54ab30d3a73d0a8712fde612294cda2aa1ccf164930b9b1d17801d4fbb06e849d39bf2b5141330caa0d2618b616f1c67e1ca57080e79ed9092ba7a55e8121cfc825cd26a0199a479a7ab1b7b23d2a4dd82fa6d04ee41ca680435efc934f0451e865e8632ac2f1115f4cdd33b0fccb7a2326127faf20cba37c828613dba5a98f4e1ad25eb6b91078cf73d873df9ef91531476f64b83559ff7ccdc4c070d478b18196ea05fe8d4ea0216ee5273dfabbd04582f40f064c9781afd2cbf30901f28cd09cc934f1b2d50883778274177e3dba8af0a1b931d80ce1a6c4085780ea2195b65ecfd2953f78a5290fe560d0cd6a5e73890a5a82dc410b92a3ef2be05ec5607820fd4ca6b9c3aa258d59022fdcb21665f1ce4e8aad8fd918c43bd3c2afe3dc223ff9f48831d401c8b6996190793d1dd7551f8511b69283992398d8f9b4bd2b3398d3b8c6f3c5d8b802ca5282b70242df2b7be4b38e70c3065f8da888631375afcc05ce578089c4f783776b286b7a60d1b5e189e2742a3240c1036a953d886885422eef01413c38099b64505fd5a73488acb4e611820674c58ae74d6c64a885d4beda9bd7903bcdc71e3711e2a057c0eab2100c321050ab14c6e453c53182577ad3178603cd9afde40a701120e9a36074fd582428c74e02781318e6c65450f8f020bd22475696fe13b8c59260e53a06d16eabd135e887a0a6bbc8ad21be7661df76fec5b13844f68b8eed1a7379713738beac9f23c7a26520e19797a910cde9fb285179526889b908b7eb49bb06f70f6271fba8712c1a4269ebcf4b7d043e924e3d2c4c753fd7e547d95841e335179836f76424e728810d7f32b78256ea30c79d9238a6588426e1f2d4c0b03d5605bd826ed24f0f11326b4cf958632b86e017aa80e142db1580c44f76d9c98196f3f6852ab2bfc6a01a3553a130c2d171957f5a45c3550fbbc990ef8742a98a86b280a57b9f198ff436bc01161ada50e6f23026c3254adf2321bff7e20aa54080bbb57d8d52c6a6df6107706a2e5bc6da68f17b474c0edd39401d765086e885cf7992405f856557915603cbe8894676e996bbadbb649a5e7498b91f9bd2f697dd9ebbe4d386050258b9f4c94781e61c660651c3f1e3ae51f8c035eca365bf15d6db48ea9ce183515f4a208d010f7c23dcacbd6e225490d7e9c133525f5c9018d752b21b4897bf18b64b6a9936f538a0a8958fc934440aeeaad2b68ac844d76f0900a6c95bd0b353d85d4fb62eb88360112237fd8c636a80e3130b21d66ae8ec58a4b76cba0602f96da919f7e84fd37e3ec2379f58e389a39c78d2482e03c379e3c4649ad63a76e3707ecff07d2fcb0c9dfc524cab49e69a09c92e4f88714335cb57d3f6184d07bef9657280fb5c9fd2d8f940f7ac6c5407e3077aa2e4ba8e217e0ee19e302d6d90e3be05a86dade35d2e454e511afb5cf5936f1d11f2fa6be6ceaa817dbdc7a6aabf2fad8ff3efa8382a25099f0c5989d2ad56ae0f4968b2cfcfc67b4f1c161c75900b4848f59a3c0376dfcb7997bf28e9e85d6dd942a360516de38e1c1a038a796f9a77ff2b0c7e5e8f4932391a0e58e76dacc6f9764178a211dfde3e75d367d2911ff398126ffdf83cf2fbdf1ad5232bed9155f7a168638a572094a9e934d4969b358cf6e121d7fd2aeae2f499068b42c152f0e3403a230885d6f92f038ddaa23499f804ffb06abdbabb51f6c38c92fb1a6271a4b13d6d11125b8ec12efa5907dc65062797fb9cca15e2f254e76b182d3fcdb4e96ac4de36d6df7e7bba5c32f422286b1be3b79bffb6fd693761952d195a84ad9ceb07287a0fbefab9e0347b513c5f60233ccd4b52d90ec144a2f896d9dc7f279f8aa93038f3efa286e1c3006933a4d7183d952f8d28b141b28b2af355b5bd8198dfde1ffb8d09202aff0d16ca3fec194662892a49f829813970a4520f1228aa03d211a45bed3b2e05bf1f10b1a152761e7b6c6ddea863a3c02224256092c70ca70dc185c4c385dd98b09e2682661e1e66f71d9c4037048eb70e8a1cbe57de87ec43713abf5fdcf63b9c482f318e3bec37e878dadbae15a02d731e6c8574eb14c059d72f73be5174add786d06b585a28a06d349d8e434a491b34897b3c1ad786ec8280d7f57edd4fbc6aea5485d659b59d393e331cf91e6ed76f340fcf7cf460892fa7318fc42b883f61d888ad982a751accb613c66661fba5f3d6de751a6a9ef8a4700316aaad04e991aab7903f4ef012ec2a8c092234e74ef335daf360ae47bbd2bbc6ad8c1a4f81efe8bbd703cb55ef36b32b4e30cb5a3b165c02ba295d0e1c40ce6ff8f479a74f01275f113ebfa8ade37a59ce70e6ca2a6f48f1be085f61bf772e2c2da523a2cfe63e99c57bdb1ff23139d4fca49eff7547e9880eefd3f7511a677efa23b52098ba89037c48dfcda2e8c1cfb9f892161049e53f8cee55256279512aecab8c441600dae0fd957883273047cf5c66ba209f830aa2ce0cbe41ca08c0cef4aed7f4324009200661a7ce680e5a8df2d051c1d8b2f63d25d8d74d05c75c46c8f3f24d625539e63459650960498a54ec3b16225bbbf4d3930009df265839d72611f5332a904cdebada108236e4414a2909ad01ec44b9d7f75de4385ad7ca5152e890a0919b3639fd1bcbca3b737ebb8d9ae541b1271cf2166ba15830e66f3d3afd3b754a7f81ad4f0999704ae99c114907c5be4a4797f13b80564f234723a34dbe137dabfd7fa23562df679f54a6ab54def6d63deae9844f72fd73efd0413551f5c4b9ee826eb3b7faf92a59ea34a16723b4fea14d1c8815a4e2d39fc48d1dbce526a7c53f5a96d0ef6463a0cee73fd3505f5c764a264b83c4a21f80e8b61c82d24442d13da99d18dc1b2538e7a510f6093d9ef2bc5cc777d4f98411e93919eddfd69d6e20d227cb61c50f358ea227f4de941fb080c1cf6b1f6e25533768fe133dbfc3f9d29c603bed38aa3c5af5b81a706b0067b40b88f992610d04c7cc36b8f649697cd6a93fae51138161891ae75a7147780fc59af5a6e18c54f9d2a4fe7fa92314b399afba9a40d0cc24f70a2593acf8d179215e06b7a9a88224bafcb2cbf60caf5fe4ff38208a70793b5dc33cd572956260e1c86312d3ba9b3a4b2b44376f2e78c616a6c0880ac8dcbaa30b9f761d500fd03a8518dd0509157b184a2d95e0caf3ffc8ac2db6c54d80c71a1e5b9ea3bf51071e2118af204123daceeb04e4f6f31f32a4d3fbb76ee49440cabda2c121c1b99acab5b87cecc37c3f9066af34ab29d6598bbfd91047a2ac7ce3a8f3027ff5e6d743506f161087278896a98ed37122ba208b61cf54d3929555ab06b564cd5e4f46f4755a6cfa2ef2b30d29ea66f2749d4060d411fa9160c91b6f55cf071ac8222c6313df18759e2958cddfe3db4cbeb9cd39abcf5f0beaecae8437813995cb7ed0b87d42ca942ff7245ece204798d01361c5f008e0d82bdf76660515bc78f7f8f409ccf68614b2cb50f5af2615661326fd971bc57eeeade60ea906b8df1cb0dfafd318cd2c396309c329d0469ca192aa8f51d7c4227685440f073983255baf054b97b9d7be1d1470d7eabd5c09b2116b4e86b0567b7e97e088717a4fe3dbdd310a1c39136ea4d2c47492001f9885dba03bf97e7da376171d666441cdc2f999db137603d57df32b4260fa0165e82917bb1631ea314e7a7437e66fc68cef22cda8f456d6e583f6e3237e0bc79987a9103f7cf0918e26881f67ea582e1ff3a49177599d385bf6e42572a2547933aeddb826530e9adf30dd84c3a7fae5c4c26f6c6f3a9f0906decd314e2407825abef959c5416d18a92ff34e6c521a16e8a0a29937c77d4ee99b41d530a732acbe0bf5d274df9d496b47a9a624546bdcf9976cde12ec989cb2a70b33a7c8a3a77652023164695f9db30dfcf587f0cd4f73e385730bcbdd688f6dcb08ba0efbb9f579220afefa4acfea522e864fce9b1782ce9f14824d16e9d33a2609c23ba3c5a1af02549357a0dcc12e37819d778021762cf895abeac1125b744c8b8225a091e7be9ded9993cfa3ca9abb83e25c8f559009977a2ed9374a89619fae5ef6d164bb73d242004dc8428e44689b33ee3bbe88bb4962ab0a32a90e7aea044f08410752cb2d7aeaf3196648a3a99092665b478bb394b48f79b36db0efc7f50d6a5179c945f5298cfaac5e5dea715296f92abce7281d48a0c9c6b785a35ef5f1697c047ddb254fe9a8ab9f498b0c1ae09ffd01a3d8d427fee7e36c51e0e5c2fee2245fb8464626ab5c9857ebce91f7d22bf024d10c2d71021cd69268472de419e6cefd970cc3a8e4d1bbe6496799aa7f100411766e712aff08b731460f14f9d7356db12cf8e1c6121968dc68b1d81c086b325ca4ce6fe1f476707e08fa913144b757c6be17cf93150db29544d207f09a896f33b7335d9339215da751e7af2c6bdd19db6f521af2c8a5998dc607f97026d07111488741134c1c86eba123273d1fd5ee4b471e86f9ae9478a04c7482076ab34a1eca5c64f89e5106eed44bceec019c67c12fb4db4fdac153f4ac3b63ffeb6d30de58ec039e2dd3c181e254cd94d0a2b0b44490384cc5915b54ee1db2b6d059879bf8126c9ca976d0f7862da07ecd350930a081810a7afd72b2ad3f65b96ae9c7f91227a2b5513a559f36b90fe01be9ae5ad3ca65e2c26f358fc26b858a3633fda7ae49a5fb705220a5819b3cca41b1ccc21d7c40f5fa9c422288efa5394e4312675899d704a2aab62b8363f58fd4bc12a8bea6ffc45b4414237bf5f019321206dbba439acb5ef26641f30fdac20f964354bce94e4c9d73e137f9806deefaf6f4acaa0e76ad4fef9f6cb7fc01bbabda9612c05adbe46afcf94819e8a4b4b49ff764784fa432d47fb6d4230900043d1b4521cd6839fe8c5df4d1899fdfb13880e207cac73f0a29020bdd563bd9c2f6bcd1ec523b3e03ebf6164fc65af001830c51396f9df2d346f83a59cfc82201cf1150ea57259d579fc2ed199b3fbe42d5188c84e4354610743e5b23a265246313cc63913f17412fa00d98b379b80b96d936969572e11316bc8926cb23115186f3b2387b82c3898fa41bf16a308da62d5a3eb3609af1943fddde08a4036eb2a41b7292caad9eb082614b02a1fa255bc7abd4d0e3b4ec1801e131e68c7aa9da1a0ff10f9de87dec8fad1ad8bfa99caa49e203a7b9c33e044d4544a537471e7a452468b821959bc488c6b8cbf81e90081a26de273ad1203cc06adb6af242ab19f96c1c66b58c37e2c9309704fba63af99a8d9c5efc651afb631fe9f546b938cc3b8e526c4159e5c9f7afb29fd1d55fabf09367ce2a63a35e7a2062d1c772ed981fd77157a847f687a177cf9886ce41df8cc509302b46bc1e2ba896b1c1656a1bbfdf4cd9ac39cf8510d1c823075f16550fd044aacc8d42a56f03718f7b18475cdc3999faeb25ab3dd8a807ee04d8e5d831d08b4e309dff50330685138797e10c6362636f53f22bfc1f3d5090a5d369282d9de36bb4e2505411ccc6ea395afa1567b15a2fb4be2adeea7126b1a8e80034105e0d98bdd78e796ce1cdc06a4ae666fc0baec5c52614340ed997673e26ec47c88846c000bb7c9077337cd44f5c041fdcc64986e5e1c0f488148f0ee6f842c44c0b72e82109270341bba6e9080b70fcf930d0f10be5a36798e70111fed72727b72282ff164fc08319d74f1f57cde71b57cb397a9e753f87b97729bafba017a24cbfdee5dfe7fc296c112e93bb8fce560ca80a3afd8370baaa79ad783b51352b5440b144a47378c9ae22eda5794328e95bcca220fd07bb56915529b155c61858efe89ad36a79288e74c0e251addcfaf797432175a5562b46eff5e3aebeb74623e18beef85389383c604d8884431b07dc4bea0174aadc337ff41f558a63f16690feae47efa2a5d1318b7397e1e4ba398727d286791b71610e1d78d32800e7e113c12abf0f60b6ca4401ecd23b7aacd990633b2b017daf6bfef1b2361ece74b7dbcbb1a73d4bc1f9d2e5c9fb0b7980d25cc44d1b10c09ef5a6a05c84669294a5cadf0cd88ab449f9f0bcdd8c48590d416c5c1feaa494a2145949c2a3373df7c6014225f2745bbeb20ff294d22c0d96ca111e6926946207cab56a03162a49e68968e398f70690188ee3ca847ef421742d60b9a6ad029e8a3d607950b2bf8ad8ff297cb39acc94905635770436e134435e28205140331b5100d9f64469792fffac87bca0835cbc617446ff86a7b50418c305f32e658b32130e491e38709fd3697017ac8084cdf1ed81a28375aed092ab4e32ca88a933154dd3a9e99351acbada926b67b310c7070ac1a414a28c5abfe1f45476249a12f18ca2d981528d881ed3c5072e46a6eff3cdf37dcbc89c7f79c88a1f8d15d15beb66a0e4440c7b93e379c4e2bac1d5c8e85f1852887e2cfeb178fba1c67dc2adb0c87df8ca4444ca7f455509f492effb5001328b8cc696e2933207a2d78bbce8562ca34a248193c914406b161c8141479d891b0c6110ec1e25cad38299b489f2ec437017cadba67dcb58abd4933c95b3526f1d4747b8701a7d71e446e4b62e2941d4281faca0cf22914be5aad80f47100000000ceb24e82508fe55a92fb6db70d03d1c1ec09cfee31639341756a4630a0eaaecac7bfbddf9d30c42cbd45eb181d5bd341307ad26f496bb042e2b655c03ac3dcc587acbf50f79b5c239be9938b62d3251b199f8413b020605d5d0552cfd9c39c9132719d6d0a326b000e12fcb51bc274df79d11430060d05978cdd50583f1bca82c57dbee605e2d00fcb5414af13a596d35cb5ba62de6a28cbccc857d23547b1c7fd5ac8fbf6758d5b8451fa46d9acc00344dc2e565674b1dd3547eb8f8aa5fff99042f8d1d59e6ad2f53379211e6832fcb68f5777eb2db85b28f724f4e4ce6342cf55713ff7b0cb4f7f47dd12a6566b86709eaefae024373267ce72a89e7f3e42ab48edcccc96b5d0403fe93a927e5ccf470014f220b8257393226cd7b996f20e6a34f81206733a9fdce03b701943c1b560d3eab68c2c225cf7f7f2b56123be2bb173e9e5b37f4d3348f6b987764ad07c2acd44514ff264d7eda31e5e517a179414841ad4553d51c08f435e05f10aa82d74b97a9ba3a133e6c9175fdcd4f3dc9c16d3be1d5bbaf13240177081ac1d56681bfa988a93af09868afd608520c0bfd71d857a6661fdaf6f2e166987eb007449dd26334ae932c5003fefc0f983b9e49cbfcea325f2de16a9ae935caa46f5b3433957fb370971ed957f138f08a60fed5b84995e428e7ae7d5c22021ff016baef0e713a118344c016a99ad469313ba7f2452da0dd82e019f64aa229cf80a69b3e08ac5847f10d247179855546313232f23e055c2f74ecef14e0fdcc29a9bf0976fbb249bd5c7903183d2a53c70960a183630e7d4928daa7091a85ad987d2a4a5b8f6be6612fa72d9fbb33c67bb38eff19f2e784f94e0354cf6d35a5b2c62233c039de3734b38e97ec72bd673fef09fd56fec329818cc68cdf12cb52f7d37a8350c16e94208880bfcd3e895d7aa4489e3dd15db4a9026f0d2a46f1e89c35845dbd976a1992b87c15a0c7580e6424b8792a7bb7b933d7c5433d4133ba4dbbcf7995d6ed3feaa32f876a287feeb9cc6107778c1f83e0119d980b9e994c2a3ae3de24a103efb3cacb746b49d1ad85746b233ab4aaf0e988ec2a786bc93f32040d3bdc3008031634cdfded5ac95b2279e096243228296591e7ba53c4a127772cc4620e6b238ccad250629194533d0a669ff3366c52d64928693e0b0cbb0b8e2c6029089d4dfe2b4b6c5dcd85f1a02770611e65001e48a32a8b0431a3b9d77fa3a95be38a0436a704c05a8e0183f3214c25531a63796f679bf72885aa766468d42b2543542d7e82544efc5c5e81e6a91a0f5d4e68000cff687d63e45c9a11d4ef515050daa592c9a828ac7c0488e7cdb3d6fdaef5e9176ee68d981ea50d386d74df3b40660351736deb03bfceb721878cf9894b0302df15964242ab6b9f77f98ba1c7993735983d2b022600ab74a19e3636e1400d08ba45d3a5c2774cb06a1c358bbfc11d27efaf7ca53c2e7757c8c76da24707d91a4a5244262898d68083ff91c514d9b9b1ebaa0cb0b10254fda1b1e82b9a1a47f117b5b280ddbec1f6732d11117ef1a7a674699df87fe795d1243cb9c4527e364e2b711b6562a87fafc130ce0baf1701686639b05f0c8dc708f008b1e6ab89e8d623bb83f3d54b7bcdbdacd055ac4eccbd36bbe0af0f65a00e3d6dd985ae8851d176976cfb5816d1fc2a63d3546aecaa4e712ca6961d1f181315d553de6b53485faed0dcfcf819a1ba3badffe797377d3d1ddaed8e7a0acc0c3d277762262a139f94de49faca167b11bf04f2104a5ab9a73367a6461f7124c91a2c4229ef98e6ebde9aac283c7d029400d71293f488ba169b62c1e94689cf5b248ed4aea62b88d65bb764cfe27d5231a58486e7381df518f4ed81cb905108c54a5050a94ca0e94da20d3794bc5fab9127dc95b6404b1e27b4e28136fc27806f7be798444c33aca88ffd45b860eba0d5033839f5a092863954604f1952bd61dad23b11643fe14f3ade08116aa2c13eee701ccd13e506bd65a1060bf69579aea8c8143cd38c0891a3065f251eba0c20ab9c69ddf28e3bd6400cc203bac8de1882239ad4e1b97b0ae2f1abb7bac7c0d8ef82b97ebfb1f5577f06a3a1377b09ada4db87d342f20ab0eca4b9c206042471307511429cb57a578211f92d3647189861cad9145f5eb26ab696abe50a2a6c1b469df97da28aba4e79b586c348a430f5ea61c4be1032fa61d18581f05a07fb8707c8996e0fff1c3eda59b992687fa12483b9327e10224b20d42e8b3fc4670bf070ced602283273d6818acd1f6da567c44d3f5e1377065d43d87d889843ae48e7fa8ba1634815695b8c480ca271e6e833799c70da80fd79acc09b989667a2294de5da73f0363df9a33ad4dab8d27cf7bed0a06838672e3d07d52b6396e9b5576021d5e925abd533bf161c944795065fdd44e8462e3070c479f1c118276653488dd9b2f1a673f8cad3612ca1fab4388ec9c8f834a01a499adb7b3a9a977672f6d75b41bbdd7f91ceb7e7a88568d17bb432be9e4e96e115075bce197ef4754d2914c2c59e2d7f4c08f0dbe34d31f229428f211bf1d7e8f5c319ed4a8273cb6255eb318851ac4557b0278fac63107a54d407c42f300b843a12abd3b893b46c7efac2e388ab42b87aebe2543bd4c15f459bc50aad10ffe1c1196fb52c26e54bdaa7fbd52451f207ffb073ef4b3f71eedd7da40c89505019739e3fa733bcdc84ff4919e8fe2358129ef28291be1d6426b8bafe88463b1d3cd7273745381c7f65221898e6ad361e88b24c54ccc7ac9a830145b6dc096e2d71ef71ec4f03524cb870b724e08d223bdec2f6fdde6200217a13b5136004d455d66547f5a1793e0cad85677d49e5c558852107007c8136812cf021afaf6f7e8f59883371be46cda412dd9c6fcf187c31252ceb5758901d39cd5355ab386d9a7fe6ea46ebf277aaf809c3023211ea9aa189de4d422080ebb9fec50ffab6b95ba4ae5018accc497e79149ed6047ce561ccc10e9194cdccd5c9fb75175c8dbc9d0a916ad59288f010defbbb50d263041ab37aac0f93253bef6f898cd0825d99d27224f26181f9713b8979da64756c95e7505f25a2688960d6155c3613dcc31b6c337a6dbfc6b12cfde1db22b93bbd5e48534fb0bda8b212577a14dcf665c834b0bd24e5f624d2455fe048dbe930328d7cb632db3b0e244bb5d43390b420b15157a339487fc78976f867d3a361aafdd3f50a93c01882da7c220089a544381db22e2c86b228dc2be01820468460437588952a549d37498e529e62aa62bad1580546bcb1e9a6ed1870b7838d05d12f6e3a041e78b1bdb80894626f20889ccb3a468aa4fb24b9c87cbb28623ce59c6b3c6286db366d08004551a25fe4d8d194a2bb7c52e1c85a5fbe4cb15b171489da121bea1c469a6bb185d63213084e3a81ee54dc03a94dc5ecdda7bfaad1df68021aaf4627c9d529f13e5c81b5ee4dd228949ca16b9a61d186211d153294470907557e5e14ae665013f285fe4d3766e7b3d8ce5e2a14692072d4d8f79354bcc8db8a2a36c8bcd", 0x2000, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90, 0x0, 0x0, {0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}}}, 0x0, 0x0, 0x0, 0x0}) openat(0xffffffffffffff9c, &(0x7f0000004400)='./file0/file0\x00', 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000002e00)='./file0/file0\x00', 0x0, 0x0) syz_fuse_handle_req(r0, &(0x7f0000006a40)="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", 0x2000, &(0x7f0000003300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000002600)={0x90, 0xfffffffffffffff5}, &(0x7f00000026c0)=ANY=[], &(0x7f0000002f40)={0xb0, 0x0, 0x20, [{{}, {0x0, 0x0, 0x1, 0x0, '\x00'}}]}, &(0x7f0000003200)={0xa0, 0xfffffffffffffff5, 0x4, {{0x0, 0x0, 0x9, 0x40, 0x0, 0x4, {0x0, 0x0, 0x1f, 0x7ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r2, 0xea21, 0x7}}}}, 0x0}) [ 649.556715][T13654] loop2: detected capacity change from 0 to 208 [ 649.615991][T13654] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 649.615991][T13654] [ 649.647063][T13654] ERROR: (device loop2): remounting filesystem as read-only [ 649.676118][T13654] xtLookup: xtSearch returned -5 [ 649.698707][ T26] audit: type=1400 audit(1639309882.620:277): avc: denied { read write } for pid=13657 comm="syz-executor.1" name="fuse" dev="devtmpfs" ino=97 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 649.724218][T13654] read_mapping_page failed! [ 649.736485][T13654] jfs_mount: dbMount failed w/rc = -5 [ 649.760874][T13654] Mount JFS Failure: -5 [ 649.788725][ T26] audit: type=1400 audit(1639309882.640:278): avc: denied { open } for pid=13657 comm="syz-executor.1" path="/dev/fuse" dev="devtmpfs" ino=97 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 [ 649.832364][T13654] jfs_mount failed w/return code = -5 11:51:22 executing program 0: syz_open_dev$MSR(0x0, 0x0, 0x0) syz_open_dev$MSR(0xffffffffffffffff, 0x0, 0x0) 11:51:22 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c73", 0x81) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:22 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c464", 0x3b, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 650.017963][ T26] audit: type=1400 audit(1639309882.820:279): avc: denied { read } for pid=13657 comm="syz-executor.1" name="file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 11:51:23 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000003c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CHANNEL(r0, &(0x7f0000000a80)={0x0, 0x0, &(0x7f0000000a40)={&(0x7f00000009c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) 11:51:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b", 0x96) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 650.221932][ T26] audit: type=1400 audit(1639309882.820:280): avc: denied { open } for pid=13657 comm="syz-executor.1" path="/root/syzkaller-testdir897957299/syzkaller.LU1hQn/502/file0/file0" dev="fuse" ino=0 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=blk_file permissive=1 11:51:23 executing program 5: prlimit64(0x0, 0xe, 0x0, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b", 0x96) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 650.523963][T13671] loop3: detected capacity change from 0 to 61456 [ 650.547410][T13678] loop2: detected capacity change from 0 to 208 [ 650.592646][ T26] audit: type=1400 audit(1639309883.510:281): avc: denied { unmount } for pid=3632 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fusefs_t tclass=filesystem permissive=1 11:51:23 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x19, &(0x7f0000001300), 0x4) 11:51:23 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x5, &(0x7f0000000000)=0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r1, 0x2, &(0x7f0000002740)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000001200)={0x0, 0x0, 0x0, 0x0, 0x0, r0, 0x0}]) [ 650.655126][T13678] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 650.655126][T13678] [ 650.741968][T13678] ERROR: (device loop2): remounting filesystem as read-only [ 650.816447][T13678] xtLookup: xtSearch returned -5 [ 650.821860][T13678] read_mapping_page failed! [ 650.871918][T13678] jfs_mount: dbMount failed w/rc = -5 [ 650.929773][T13678] Mount JFS Failure: -5 11:51:23 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b", 0x96) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:23 executing program 0: socket$packet(0x11, 0x2, 0x300) syz_emit_ethernet(0x62, &(0x7f0000000100)=ANY=[], 0x0) syz_emit_ethernet(0x3e, &(0x7f0000000380)={@empty, @broadcast, @val, {@ipv6={0x86dd, @generic={0x0, 0x6, "117da6", 0x0, 0x0, 0x0, @private2, @loopback}}}}, 0x0) [ 650.976878][T13678] jfs_mount failed w/return code = -5 11:51:24 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c464", 0x3b, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002700)=[{{&(0x7f0000000180)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @dev={0xfe, 0x80, '\x00', 0x14}, 0xfff}, 0x1c, &(0x7f0000002580)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}}], 0x2, 0x0) 11:51:24 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08", 0xa1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:24 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002700)=[{{&(0x7f0000000180)={0xa, 0x4e22, 0x0, @local}, 0x18, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0}}], 0x2, 0x0) 11:51:24 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000580)=@filter={'filter\x00', 0xe, 0x4, 0x340, 0xffffffff, 0xf8, 0xf8, 0x0, 0xffffffff, 0xffffffff, 0x308, 0x308, 0x308, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@private2, @ipv4={'\x00', '\xff\xff', @local}, [], [], 'macvtap0\x00', 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xd0}, @REJECT={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@CLASSIFY={0x28}}, {{@uncond, 0x0, 0xa8, 0xd0}, @common=@unspec=@STANDARD={0x28, '\x00', 0x0, 0xfffffffffffffffc}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3a0) 11:51:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 651.555743][T13695] loop3: detected capacity change from 0 to 61456 11:51:24 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08", 0xa1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:24 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x24, &(0x7f0000000000), 0x4) [ 651.665425][T13701] loop2: detected capacity change from 0 to 208 11:51:24 executing program 1: perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:51:25 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x16, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 652.040303][T13701] jfs_mount: diMount failed w/rc = -5 [ 652.069716][T13701] Mount JFS Failure: -5 11:51:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08", 0xa1) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 652.138782][T13701] jfs_mount failed w/return code = -5 11:51:25 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000", 0x59, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:25 executing program 0: r0 = getpgrp(0xffffffffffffffff) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000180)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 11:51:25 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000001300), 0x4) 11:51:25 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f907", 0xa6) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 652.652729][T13722] loop2: detected capacity change from 0 to 208 11:51:25 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:25 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f907", 0xa6) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 652.779932][T13723] loop3: detected capacity change from 0 to 61456 11:51:25 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2f, &(0x7f0000000140)={0x101, {{0xa, 0x0, 0x0, @mcast2}}, {{0xa, 0x0, 0x0, @remote}}}, 0x108) 11:51:25 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000001300), 0x4) [ 653.000068][T13722] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 653.000068][T13722] 11:51:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f907", 0xa6) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 653.137511][T13722] ERROR: (device loop2): remounting filesystem as read-only 11:51:26 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000180)={0x20, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) [ 653.236463][T13722] xtLookup: xtSearch returned -5 11:51:26 executing program 0: r0 = socket$can_raw(0x1d, 0x3, 0x1) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000940), 0x0, 0x0) fsconfig$FSCONFIG_SET_FD(r1, 0x5, &(0x7f0000000ac0)='GPL\x00', 0x0, r0) [ 653.285325][T13722] read_mapping_page failed! [ 653.333680][T13722] jfs_mount: dbMount failed w/rc = -5 [ 653.416806][T13722] Mount JFS Failure: -5 [ 653.421346][T13722] jfs_mount failed w/return code = -5 11:51:26 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000", 0x59, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:26 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:26 executing program 1: r0 = socket$pppl2tp(0x18, 0x1, 0x1) ioctl$SIOCGIFMTU(r0, 0x8921, &(0x7f00000003c0)={'veth0_to_bond\x00'}) 11:51:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd10", 0xa9) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:26 executing program 0: syz_emit_ethernet(0x22, &(0x7f0000000000)={@dev, @remote, @val={@void}, {@generic={0x88ca, "25209f615c6c74ca79038f08276e4212"}}}, 0x0) 11:51:26 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0x0, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:26 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd10", 0xa9) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:26 executing program 1: socket$unix(0x1, 0x2, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x10100, &(0x7f00000001c0)=@ethernet={0x1, @local}, 0x80) fork() 11:51:26 executing program 0: syz_emit_ethernet(0xe, 0x0, 0x0) bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x18, 0x8a97, 0xf6, 0x2, 0xffffffffffffffff, 0x80, '\x00', 0x0, 0xffffffffffffffff, 0x2, 0x5}, 0x40) [ 653.932623][T13754] loop2: detected capacity change from 0 to 208 11:51:27 executing program 1: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'ip6tnl0\x00', &(0x7f00000000c0)={'syztnl2\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr=' \x01\x00', @private1}}) 11:51:27 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd10", 0xa9) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 654.213638][T13756] loop3: detected capacity change from 0 to 61456 [ 654.232719][T13754] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 654.232719][T13754] [ 654.307235][T13754] ERROR: (device loop2): remounting filesystem as read-only [ 654.315065][T13754] xtLookup: xtSearch returned -5 [ 654.343846][T13754] read_mapping_page failed! [ 654.376431][T13754] jfs_mount: dbMount failed w/rc = -5 [ 654.412913][T13754] Mount JFS Failure: -5 [ 654.426767][T13754] jfs_mount failed w/return code = -5 11:51:27 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000c80)={0xa, 0x1ff, 0x5, 0x2f, 0x0, 0x1}, 0x40) [ 654.897291][T13756] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 654.897291][T13756] [ 654.919852][T13756] ERROR: (device loop3): remounting filesystem as read-only [ 654.927660][T13756] xtLookup: xtSearch returned -5 [ 654.932624][T13756] read_mapping_page failed! [ 654.982525][T13756] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 654.990853][T13756] Mount JFS Failure: -5 [ 654.995276][T13756] jfs_mount failed w/return code = -5 11:51:28 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000", 0x59, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c", 0xaa) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:28 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:28 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003480)={0x18, 0x8, &(0x7f0000003300)=@raw=[@alu, @initr0, @initr0, @call, @jmp, @exit], &(0x7f0000003380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:51:28 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8948, &(0x7f0000000040)={'batadv_slave_0\x00', @ifru_hwaddr=@broadcast}) 11:51:28 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:28 executing program 0: sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, 0x0, 0x0) 11:51:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c", 0xaa) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:28 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000040)=@raw={'raw\x00', 0x9, 0x3, 0x268, 0x0, 0xffffffff, 0xffffffff, 0x0, 0xffffffff, 0x198, 0xffffffff, 0xffffffff, 0x198, 0xffffffff, 0x3, 0x0, {[{{@ipv6={@mcast2, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}, [], [], 'ipvlan1\x00', 'veth1_to_bridge\x00'}, 0x0, 0xa8, 0xc8}, @unspec=@NOTRACK={0x20}}, {{@ipv6={@empty, @empty, [], [], 'syz_tun\x00', 'bond_slave_0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@AUDIT={0x28}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28, '\x00', 0x0, 0xfffffffb}}}}, 0x2c8) [ 655.331284][T13785] loop2: detected capacity change from 0 to 208 11:51:28 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x17, &(0x7f0000001300)=0xfffffffd, 0x4) 11:51:28 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x3, &(0x7f0000000000)=0x1, 0x4) 11:51:28 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c", 0xaa) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 655.524846][T13788] loop3: detected capacity change from 0 to 61456 [ 655.609100][T13785] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 655.609100][T13785] [ 655.688532][T13785] ERROR: (device loop2): remounting filesystem as read-only [ 655.786660][T13785] xtLookup: xtSearch returned -5 [ 655.792116][T13785] read_mapping_page failed! [ 655.849653][T13785] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 655.938152][T13785] Mount JFS Failure: -5 [ 655.942946][T13785] jfs_mount failed w/return code = -5 11:51:29 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/104, 0x68, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:29 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002700)=[{{&(0x7f0000000180)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c, 0x0}}], 0x2, 0x0) 11:51:29 executing program 1: socketpair(0x15, 0x0, 0x0, &(0x7f0000000300)) 11:51:29 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:29 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:29 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) [ 656.475805][ T26] audit: type=1400 audit(1639309889.390:282): avc: denied { create } for pid=13805 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=rds_socket permissive=1 11:51:29 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0x0, 0x0, &(0x7f0000001640)) 11:51:29 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGPRL(r0, 0x89f7, &(0x7f0000000200)={'sit0\x00', 0x0}) [ 656.607233][T13813] loop2: detected capacity change from 0 to 208 [ 656.709424][T13817] loop3: detected capacity change from 0 to 61456 11:51:29 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x0, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x541b, &(0x7f0000002480)) 11:51:29 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x1c, 0x1, &(0x7f0000000280)=@raw=[@func], &(0x7f00000002c0)='GPL\x00', 0x2, 0xbe, &(0x7f0000000300)=""/190, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 657.030822][T13817] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 657.030822][T13817] [ 657.053546][T13817] ERROR: (device loop3): remounting filesystem as read-only [ 657.072332][T13817] xtLookup: xtSearch returned -5 [ 657.072423][T13813] jfs_mount: diMount failed w/rc = -5 [ 657.081122][T13813] Mount JFS Failure: -5 [ 657.116425][T13813] jfs_mount failed w/return code = -5 [ 657.134646][T13817] read_mapping_page failed! 11:51:30 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0xc, &(0x7f0000001300), 0x4) 11:51:30 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) io_setup(0x5, &(0x7f0000000000)=0x0) io_submit(r1, 0x1, &(0x7f0000001ac0)=[&(0x7f0000000380)={0x0, 0x0, 0x0, 0x8, 0x0, r0, 0x0, 0x0, 0x8}]) [ 657.176059][T13817] jfs_mount: diMount failed w/rc = -5 [ 657.242724][T13817] Mount JFS Failure: -5 [ 657.261113][T13817] jfs_mount failed w/return code = -5 11:51:30 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/104, 0x68, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:30 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:30 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:30 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:30 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000bc0), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_GET(r0, &(0x7f00000012c0)={0x0, 0x0, &(0x7f0000001280)={&(0x7f00000011c0)={0x20, r1, 0x1, 0x0, 0x0, {}, [@HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}]}, 0x20}}, 0x0) 11:51:30 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x18, 0x8a97, 0xf6, 0x2}, 0x40) 11:51:30 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000400)={0x0, 0x0, 0x0, &(0x7f00000002c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:51:30 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000007380)={0x0, 0x0, 0x0, &(0x7f00000071c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 657.755284][T13840] loop2: detected capacity change from 0 to 208 11:51:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$netlink(r0, 0x10e, 0xa, &(0x7f0000000040)=""/226, &(0x7f0000000140)=0xe2) 11:51:31 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000180)={@local, @broadcast, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @broadcast, @broadcast}, @redirect={0x5, 0x0, 0x0, @remote, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @private, @dev}}}}}}, 0x0) [ 658.122576][T13840] jfs_mount: diMount failed w/rc = -5 [ 658.151792][T13840] Mount JFS Failure: -5 [ 658.164286][T13840] jfs_mount failed w/return code = -5 [ 658.192724][T13849] loop3: detected capacity change from 0 to 61456 11:51:31 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:31 executing program 0: syz_emit_ethernet(0x15, &(0x7f0000000180)={@broadcast, @empty, @val={@void}, {@x25}}, 0x0) [ 658.707380][T13859] loop2: detected capacity change from 0 to 208 [ 658.946050][T13859] jfs_mount: diMount failed w/rc = -5 [ 658.955654][T13859] Mount JFS Failure: -5 [ 658.962296][T13859] jfs_mount failed w/return code = -5 11:51:31 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/104, 0x68, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:31 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r0, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:31 executing program 1: openat$ppp(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) 11:51:31 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:31 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002700)=[{{&(0x7f0000000180)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, 0x1c, 0x0, 0x9}}], 0x2, 0x0) [ 659.127908][ T26] audit: type=1400 audit(1639309892.050:283): avc: denied { read } for pid=13863 comm="syz-executor.1" name="ppp" dev="devtmpfs" ino=690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 11:51:32 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:32 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000040)={0x0, {}, 0x0, {}, 0x0, 0x0, 0x0, 0x0, "e667cea0edcc16e9b9ebac9caedc1814459f57d0990c5726bd3189679b770150630b14c74c979824150dbb3ccc677ceccefd6679f50273ae2a399f6cf965721b", "9f2766541720b70ab9b5c7b895e98cdd089d9a9c83ffbeb245b53dd98eed24a5"}) [ 659.206890][ T26] audit: type=1400 audit(1639309892.050:284): avc: denied { open } for pid=13863 comm="syz-executor.1" path="/dev/ppp" dev="devtmpfs" ino=690 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:ppp_device_t tclass=chr_file permissive=1 11:51:32 executing program 1: syz_mount_image$exfat(&(0x7f0000005c00), &(0x7f0000005c40)='./file0\x00', 0x8000, 0x1, &(0x7f0000006cc0)=[{0x0}], 0x0, &(0x7f0000006d00)) [ 659.474579][T13873] loop3: detected capacity change from 0 to 61456 11:51:32 executing program 0: r0 = socket$pppl2tp(0x18, 0x1, 0x1) connect$pppl2tp(r0, &(0x7f0000000000)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @local}}}, 0x32) [ 659.580941][T13880] loop1: detected capacity change from 0 to 64 [ 659.612154][T13880] exFAT-fs (loop1): invalid boot record signature [ 659.636412][T13880] exFAT-fs (loop1): failed to read boot sector [ 659.716777][T13880] exFAT-fs (loop1): failed to recognize exfat type [ 659.794301][T13877] loop2: detected capacity change from 0 to 208 [ 659.864550][ T26] audit: type=1400 audit(1639309892.780:285): avc: denied { connect } for pid=13883 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=pppox_socket permissive=1 11:51:32 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:32 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, 0x0, 0x0, 0x0) 11:51:32 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000023c0)={{{@in6=@ipv4={'\x00', '\xff\xff', @loopback}, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0xa}}, {{@in6=@mcast1, 0x0, 0x33}, 0x2, @in=@broadcast, 0x0, 0x4}}, 0xe8) [ 660.147078][T13877] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 660.147078][T13877] 11:51:33 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/111, 0x6f, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:33 executing program 1: r0 = syz_open_dev$MSR(&(0x7f0000000300), 0x0, 0x0) read$msr(r0, &(0x7f0000000040)=""/224, 0xe0) [ 660.224538][T13877] ERROR: (device loop2): remounting filesystem as read-only [ 660.266610][T13877] xtLookup: xtSearch returned -5 11:51:33 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x18, 0x2, &(0x7f0000000280)=@raw=[@func], &(0x7f00000002c0)='GPL\x00', 0x2, 0xbe, &(0x7f0000000300)=""/190, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 660.330651][ T26] audit: type=1400 audit(1639309893.250:286): avc: denied { read } for pid=13891 comm="syz-executor.1" name="msr" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 [ 660.332393][T13877] read_mapping_page failed! 11:51:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000340)={0x81, {{0xa, 0x0, 0x0, @mcast2}}}, 0x90) [ 660.433671][T13877] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 660.440272][T13877] Mount JFS Failure: -5 [ 660.444703][T13877] jfs_mount failed w/return code = -5 [ 660.451636][ T26] audit: type=1400 audit(1639309893.250:287): avc: denied { open } for pid=13891 comm="syz-executor.1" path="/dev/cpu/0/msr" dev="devtmpfs" ino=86 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:cpu_device_t tclass=chr_file permissive=1 11:51:33 executing program 0: r0 = socket(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000008a40)=[{&(0x7f0000005d80)={0x14, 0x31, 0x1, 0x0, 0x0, "", [@generic='t']}, 0x14}], 0x1}, 0x0) 11:51:33 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:33 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:33 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$IP6T_SO_SET_REPLACE(r0, 0x29, 0x40, &(0x7f0000000180)=@security={'security\x00', 0xe, 0x20000184, 0x368, 0xffffffff, 0x230, 0x128, 0x0, 0xffffffff, 0xffffffff, 0x388, 0x388, 0x388, 0xffffffff, 0x4, 0x0, {[{{@ipv6={@local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, [], [], 'veth1\x00', 'bridge_slave_0\x00'}, 0x0, 0xa8, 0xd0}, @common=@unspec=@NFQUEUE2={0x28}}, {{@uncond, 0x0, 0xa8, 0xe0}, @common=@inet=@SET3={0x38}}, {{@uncond, 0x0, 0xa8, 0xe8}, @common=@unspec=@ERROR={0x40, 'ERROR\x00', 0x0, "d88e078471793c7a8f1c02e40c8d4e865b0802da23b4b8ee0bbfd35c751d"}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x3c8) 11:51:33 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1d, &(0x7f0000001300), 0x4) [ 661.009836][T13896] loop3: detected capacity change from 0 to 61456 11:51:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, 0x0, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:34 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, 0x0, 0x0, 0x0) 11:51:34 executing program 1: setxattr$trusted_overlay_redirect(&(0x7f0000000780)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x0) [ 661.055437][T13913] loop2: detected capacity change from 0 to 208 [ 661.169578][T13913] jfs_mount: diMount failed w/rc = -5 [ 661.197098][T13913] Mount JFS Failure: -5 [ 661.221933][T13913] jfs_mount failed w/return code = -5 11:51:34 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000001840)={'ip6tnl0\x00', &(0x7f0000001740)={'ip6_vti0\x00', 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, @remote, @mcast2}}) 11:51:34 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/111, 0x6f, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:34 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x18, 0x8a97, 0xf6, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x5}, 0x40) 11:51:34 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:34 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x0) 11:51:34 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_ifreq(r0, 0x8995, &(0x7f0000000340)={'caif0\x00', @ifru_data=0x0}) [ 661.639362][ T26] audit: type=1400 audit(1639309894.560:288): avc: denied { ioctl } for pid=13928 comm="syz-executor.0" path="/dev/rtc0" dev="devtmpfs" ino=835 ioctlcmd=0x700c scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:clock_device_t tclass=chr_file permissive=1 11:51:34 executing program 0: r0 = getpgrp(0xffffffffffffffff) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000004ac0)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@cred={{0x1c, 0x1, 0x2, {r0, 0xee01}}}], 0x20}, 0x0) 11:51:34 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x4, &(0x7f0000001300), 0x4) [ 661.749648][T13934] Zero length message leads to an empty skb 11:51:34 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000580)=[{{&(0x7f00000002c0)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private1, 0x4284}, 0x1c, 0x0}}], 0x2, 0x0) [ 661.947312][T13927] loop3: detected capacity change from 0 to 61456 11:51:34 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:35 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, 0x0, 0x0, 0x0) 11:51:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000580)=[{{&(0x7f00000002c0)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private1, 0x4284}, 0x1c, 0x0}}], 0x2, 0x0) [ 662.133836][T13938] loop2: detected capacity change from 0 to 208 11:51:35 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f00000031c0)=[{{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c, 0x0}}, {{&(0x7f00000011c0)={0xa, 0x4e23, 0x0, @private0}, 0x1c, 0x0, 0x0, &(0x7f0000002800)=[@dstopts={{0x18}}, @hoplimit_2292={{0x14}}], 0x30}}], 0x2, 0x0) [ 662.211396][T13927] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 662.211396][T13927] [ 662.262135][T13927] ERROR: (device loop3): remounting filesystem as read-only [ 662.310054][T13927] xtLookup: xtSearch returned -5 [ 662.335350][T13927] read_mapping_page failed! [ 662.348758][T13927] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 662.392118][T13927] Mount JFS Failure: -5 [ 662.408881][T13927] jfs_mount failed w/return code = -5 [ 662.543674][T13938] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 662.543674][T13938] 11:51:35 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/111, 0x6f, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000580)=[{{&(0x7f00000002c0)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private1, 0x4284}, 0x1c, 0x0}}], 0x2, 0x0) [ 662.609539][T13938] ERROR: (device loop2): remounting filesystem as read-only [ 662.628287][T13938] xtLookup: xtSearch returned -5 [ 662.633779][T13938] read_mapping_page failed! [ 662.655494][T13938] jfs_mount: dbMount failed w/rc = -5 [ 662.665499][T13938] Mount JFS Failure: -5 [ 662.670523][T13938] jfs_mount failed w/return code = -5 11:51:35 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:35 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1b, &(0x7f0000000000)=0x80000000, 0x4) 11:51:35 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000000580)=[{{&(0x7f00000002c0)={0xa, 0x4e20, 0x0, @remote}, 0x1c, 0x0}}, {{&(0x7f0000000000)={0xa, 0x4e20, 0x0, @private1, 0x4284}, 0x1c, 0x0}}], 0x2, 0x0) 11:51:36 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:36 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 11:51:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000c80)={0xa, 0x1ff, 0x5, 0x2f, 0x82, 0x1}, 0x40) 11:51:36 executing program 0: bpf$MAP_LOOKUP_ELEM(0x1, &(0x7f00000011c0)={0xffffffffffffffff, 0x0, 0x0}, 0x20) [ 663.295514][T13955] loop3: detected capacity change from 0 to 61456 11:51:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000004080)=[{{&(0x7f00000002c0)={0xa, 0x0, 0x0, @rand_addr=' \x01\x00'}, 0x1c, 0x0, 0x0, 0x0, 0xa8aaaafffeaaaa3e}}], 0x1, 0x0) 11:51:36 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ifreq(r0, 0x8916, &(0x7f0000000540)={'veth0_to_hsr\x00', @ifru_data=&(0x7f0000000500)="625beb801eeb3e5442a4fce006f1cd3b45b37638a77a8d8a5b07a67f6e67bf56"}) [ 663.420428][T13963] loop2: detected capacity change from 0 to 208 11:51:36 executing program 0: r0 = socket(0x10, 0x3, 0x0) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(r0, 0x89f2, &(0x7f0000000140)={'ip6tnl0\x00', 0x0}) [ 663.981744][T13963] jfs_mount: diMount failed w/rc = -5 [ 664.055123][T13963] Mount JFS Failure: -5 [ 664.066831][T13963] jfs_mount failed w/return code = -5 11:51:37 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/115, 0x73, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:37 executing program 1: pselect6(0x40, &(0x7f00000001c0), &(0x7f0000000200)={0x2}, 0x0, &(0x7f0000000280)={0x77359400}, 0x0) 11:51:37 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:37 executing program 0: socket(0x0, 0x0, 0x0) sendmsg$AUDIT_SET_FEATURE(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x20, 0x3fa, 0x2, 0x70bd2d, 0x25dfdbff, {0x1, 0x1, 0x0, 0x1}, ["", ""]}, 0x20}, 0x1, 0x0, 0x0, 0x10}, 0x0) fork() 11:51:37 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:37 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 11:51:37 executing program 1: syz_emit_ethernet(0x62, &(0x7f0000000100)={@empty, @link_local, @val={@void, {0x8864}}, {@mpls_mc={0x8848, {[], @ipv6=@tipc_packet={0x0, 0x6, 'O\x00W', 0x28, 0x6, 0x0, @local, @empty, {[], @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}}}}, 0x0) 11:51:37 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, 0x0, 0x0) 11:51:37 executing program 1: syz_emit_ethernet(0x62, &(0x7f0000000100)={@empty, @link_local, @val={@void, {0x8864}}, {@mpls_mc={0x8848, {[], @ipv6=@tipc_packet={0x0, 0x6, 'O\x00W', 0x28, 0x6, 0x0, @local, @empty, {[], @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}}}}, 0x0) 11:51:37 executing program 1: syz_emit_ethernet(0x62, &(0x7f0000000100)={@empty, @link_local, @val={@void, {0x8864}}, {@mpls_mc={0x8848, {[], @ipv6=@tipc_packet={0x0, 0x6, 'O\x00W', 0x28, 0x6, 0x0, @local, @empty, {[], @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}}}}, 0x0) [ 664.590059][T13997] loop3: detected capacity change from 0 to 61456 11:51:37 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000003480)={0x18, 0x4, &(0x7f0000003300)=@raw=[@initr0, @jmp, @exit], &(0x7f0000003380)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 664.650064][T13998] loop2: detected capacity change from 0 to 208 11:51:37 executing program 1: syz_emit_ethernet(0x62, &(0x7f0000000100)={@empty, @link_local, @val={@void, {0x8864}}, {@mpls_mc={0x8848, {[], @ipv6=@tipc_packet={0x0, 0x6, 'O\x00W', 0x28, 0x6, 0x0, @local, @empty, {[], @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}}}}, 0x0) [ 665.217866][T13998] jfs_mount: diMount failed w/rc = -5 [ 665.241402][T13998] Mount JFS Failure: -5 [ 665.259002][T13998] jfs_mount failed w/return code = -5 11:51:38 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/115, 0x73, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:38 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:38 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, &(0x7f0000000000), 0x0, 0x0) 11:51:38 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002700)=[{{&(0x7f0000000180)={0xa, 0x4e22, 0x0, @local}, 0x1c, 0x0}}], 0x1, 0x80fe) 11:51:38 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={0x0, 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:38 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) io_setup(0xa21, &(0x7f0000000040)=0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r1, 0x2, &(0x7f00000004c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4203e2dde4eab376, 0x0, r0, 0x0}]) 11:51:38 executing program 0: madvise(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0xe) 11:51:38 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x9, 0x0, &(0x7f0000000440)) 11:51:38 executing program 0: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000002cc0)={0x0, 0x0, &(0x7f0000002c80)={&(0x7f0000002c00)=@getlink={0x4c, 0x12, 0x1, 0x0, 0x0, {}, [@IFLA_MAP={0x24}, @IFLA_NUM_TX_QUEUES={0x8}]}, 0x4c}}, 0x0) 11:51:38 executing program 0: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000000)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:51:38 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) io_setup(0xa21, &(0x7f0000000040)=0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r1, 0x2, &(0x7f00000004c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4203e2dde4eab376, 0x0, r0, 0x0}]) [ 665.783234][T14024] loop3: detected capacity change from 0 to 61456 11:51:38 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) io_setup(0xa21, &(0x7f0000000040)=0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r1, 0x2, &(0x7f00000004c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4203e2dde4eab376, 0x0, r0, 0x0}]) [ 665.869442][T14025] loop2: detected capacity change from 0 to 208 [ 666.063161][T14025] jfs_mount: diMount failed w/rc = -5 [ 666.089194][T14025] Mount JFS Failure: -5 [ 666.117720][T14025] jfs_mount failed w/return code = -5 11:51:39 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/115, 0x73, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:39 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:39 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 11:51:39 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) io_setup(0xa21, &(0x7f0000000040)=0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r1, 0x2, &(0x7f00000004c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4203e2dde4eab376, 0x0, r0, 0x0}]) 11:51:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) io_setup(0xa21, &(0x7f0000000040)=0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r1, 0x2, &(0x7f00000004c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4203e2dde4eab376, 0x0, r0, 0x0}]) 11:51:39 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={0x0, 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:39 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) io_setup(0xa21, &(0x7f0000000040)=0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r1, 0x2, &(0x7f00000004c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4203e2dde4eab376, 0x0, r0, 0x0}]) [ 666.733676][T14051] loop2: detected capacity change from 0 to 208 11:51:39 executing program 1: r0 = syz_open_dev$loop(&(0x7f0000000000), 0x0, 0x0) io_setup(0xa21, &(0x7f0000000040)=0x0) r2 = socket$nl_route(0x10, 0x3, 0x0) io_submit(r1, 0x2, &(0x7f00000004c0)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, r2, 0x0}, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x4203e2dde4eab376, 0x0, r0, 0x0}]) [ 666.818979][T14051] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 666.818979][T14051] [ 666.889466][T14051] ERROR: (device loop2): remounting filesystem as read-only 11:51:39 executing program 0: syz_emit_ethernet(0x7a, &(0x7f0000000180)={@broadcast, @dev, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, '(F\n', 0x44, 0x2f, 0x0, @loopback, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', {[], {{0x0, 0x0, 0x1, 0x0, 0x0, 0x1}}}}}}}, 0x0) 11:51:39 executing program 0: syz_emit_ethernet(0x62, &(0x7f0000000100)={@empty, @link_local, @val={@void}, {@mpls_mc={0x4305, {[], @ipv6=@tipc_packet={0x0, 0x6, 'Ofx', 0x28, 0x6, 0x0, @local, @empty, {[], @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}}}}, 0x0) 11:51:39 executing program 0: syz_emit_ethernet(0x4e, &(0x7f0000000100)={@empty, @link_local, @val={@void}, {@ipv6={0x86dd, @tcp={0x0, 0x6, "e80884", 0x14, 0x6, 0x0, @local, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, {[], {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) [ 667.007851][T14051] xtLookup: xtSearch returned -5 [ 667.027715][T14051] read_mapping_page failed! [ 667.268618][T14051] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 667.390941][T14051] Mount JFS Failure: -5 11:51:40 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) [ 667.420479][T14060] loop3: detected capacity change from 0 to 61456 [ 667.497866][T14051] jfs_mount failed w/return code = -5 11:51:40 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/117, 0x75, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:40 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:40 executing program 0: r0 = socket(0x2, 0x2, 0x0) setsockopt$inet6_group_source_req(r0, 0x29, 0x0, 0x0, 0x0) 11:51:40 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={0x0, 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:40 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9, 0x18, 0x8a97, 0xf6}, 0x40) 11:51:41 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x14, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 668.191713][T14077] loop2: detected capacity change from 0 to 208 [ 668.360519][T14077] jfs_mount: diMount failed w/rc = -5 [ 668.370420][T14077] Mount JFS Failure: -5 [ 668.375187][T14077] jfs_mount failed w/return code = -5 [ 668.412757][T14083] loop3: detected capacity change from 0 to 61456 11:51:41 executing program 4: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 11:51:41 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:41 executing program 1: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000006cc0)=[{0x0}, {&(0x7f0000005cc0)="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", 0xfe0, 0x20}], 0x0, 0x0) 11:51:41 executing program 0: openat$tun(0xffffffffffffff9c, &(0x7f00000004c0), 0x201, 0x0) [ 668.614356][T14083] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 668.614356][T14083] [ 668.635300][T14083] ERROR: (device loop3): remounting filesystem as read-only [ 668.643918][T14083] xtLookup: xtSearch returned -5 [ 668.654055][T14083] read_mapping_page failed! [ 668.659554][T14083] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 668.673286][T14083] Mount JFS Failure: -5 [ 668.679770][T14083] jfs_mount failed w/return code = -5 11:51:41 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/117, 0x75, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 668.864659][T14092] loop1: detected capacity change from 0 to 8 11:51:41 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:41 executing program 1: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000006cc0)=[{0x0}, {&(0x7f0000005cc0)="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", 0xfe0, 0x20}], 0x0, 0x0) 11:51:42 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000000), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_WIPHY(r0, &(0x7f0000001b40)={0x0, 0x0, &(0x7f0000001b00)={&(0x7f0000001ac0)={0x30, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) [ 669.044247][T14093] loop2: detected capacity change from 0 to 208 [ 669.272002][T14097] loop3: detected capacity change from 0 to 61456 [ 669.292893][T14093] jfs_mount: diMount failed w/rc = -5 [ 669.321541][T14093] Mount JFS Failure: -5 [ 669.332039][T14093] jfs_mount failed w/return code = -5 [ 669.341062][T14104] loop1: detected capacity change from 0 to 8 11:51:42 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x1e, &(0x7f0000000000)=0xfffffffc, 0x4) 11:51:42 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:42 executing program 1: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000006cc0)=[{0x0}, {&(0x7f0000005cc0)="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", 0xfe0, 0x20}], 0x0, 0x0) 11:51:42 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) sendmmsg$inet6(r0, &(0x7f0000002700)=[{{&(0x7f0000000040)={0xa, 0x4e20, 0x0, @dev}, 0x1c, &(0x7f0000002580)=[{0x0}, {&(0x7f0000002780)="ae0951f706c10bb43f16a78b009f55ef77ebb0d549c98baeac0e6617ade7b92ff4b65c4c3e89b80100000095d6866ca831782f1533196ed9a27d258cafaa388507324a247e61aeee330000bf00000000000000000000009d4535156e3a9c4dfc48e600000000000000000b39e65a429ebeac69bc78b6e127e19353f4f45583cef0c77c1f5308d72b07bdca3044e6dc6ef87334249b2efb32c47e073acd6a0a3586540ed2736a866863eae19f552b33cf55b07e0a07e78f7d54820d7d605d4beddc00c2073ff76567aaba3cb73fd17eff4cf3fbb7f32e498045acc3030aaf943b08723bbeb5a2fb08faae28c83bd0e5bec46608a26aa60ef8deef9a8b4f7e45182e35280945c2744ce7609f6feb1d598a608b1a754d9ca8317d18f67dc2a5980c3ae1000e7019d343caecb82abdbf32c9778ed4fb3857b70a5edb551d2655b3599869dfa5653a4b3e8ceb744732b8079d867cd068fd401c50e4e76e2906ccbf4d5769e8ef932dba976432207d41d14f1afacf2c8449ab28cfec4e2dd8f05c3d10fc47c16c6498ca1fa129c8f62f655eef7e4118fd866508f9e98c32993005fc45a1f4245196513362892d0775a5fe8cc7f05f97818511c24ef181bf7d55d90d41be962618dfcc15fc9b1dd85353b29a5b6ffc5bfff9c5f86e285ae8283794d37406dc3aa58919aa7ac92c8863f5b1f1554e79e92820ca754aed6aa6b7c5b117c0920a3b12efa3a781628d2f66d2", 0x20d}, {&(0x7f0000000400)="cf1038c5ccfacd9c711f0631a535c1b31069ccc945b9", 0x16}, {&(0x7f00000004c0)="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", 0x628}], 0x4}}], 0x1, 0x0) 11:51:42 executing program 4: getuid() syz_mount_image$exfat(&(0x7f0000005c00), &(0x7f0000005c40)='./file0\x00', 0x0, 0x0, &(0x7f0000006cc0), 0x0, &(0x7f0000006d00)={[{@discard}]}) [ 669.715313][T14111] loop2: detected capacity change from 0 to 208 [ 669.812083][T14111] jfs_mount: diMount failed w/rc = -5 [ 669.812158][T14113] loop1: detected capacity change from 0 to 8 [ 669.883449][T14111] Mount JFS Failure: -5 11:51:42 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 669.936356][T14111] jfs_mount failed w/return code = -5 11:51:42 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0)}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) [ 669.976632][T14116] exFAT-fs (loop4): invalid boot record signature [ 670.008945][T14116] exFAT-fs (loop4): failed to read boot sector 11:51:42 executing program 1: syz_mount_image$exfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000006cc0)=[{0x0}, {&(0x7f0000005cc0)="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", 0xfe0, 0x20}], 0x0, 0x0) [ 670.074195][T14116] exFAT-fs (loop4): failed to recognize exfat type 11:51:43 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/117, 0x75, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:43 executing program 0: syz_emit_ethernet(0x62, &(0x7f0000000100)={@empty, @link_local, @val={@void}, {@mpls_mc={0x8100, {[], @ipv6=@tipc_packet={0x0, 0x6, 'Ofx', 0x28, 0x6, 0x0, @local, @empty, {[], @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}}}}, 0x0) 11:51:43 executing program 4: bpf$BPF_PROG_WITH_BTFID_LOAD(0x5, &(0x7f00000001c0)=@bpf_tracing={0x1a, 0x2, &(0x7f0000000000)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f00000000c0)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0, 0x0, 0x1bfd0}, 0x78) 11:51:43 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000440)={0x12, 0x1, &(0x7f0000000280)=@raw=[@func], &(0x7f00000002c0)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 670.291995][T14127] loop1: detected capacity change from 0 to 8 11:51:43 executing program 4: mkdirat(0xffffffffffffff9c, &(0x7f0000002040)='./file0\x00', 0x0) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000002080), 0x42, 0x0) mount$fuse(0x0, &(0x7f00000042c0)='./file0\x00', &(0x7f0000002100), 0x0, &(0x7f0000002140)=ANY=[@ANYBLOB='fd=', @ANYRESHEX=r0, @ANYBLOB=',rootmode=00000000000000000040000,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',group_id=', @ANYRESDEC=0x0]) read$FUSE(r0, &(0x7f0000004680)={0x2020, 0x0, 0x0}, 0x2020) write$FUSE_INIT(r0, &(0x7f0000002300)={0x50, 0x0, r1}, 0x50) syz_fuse_handle_req(r0, &(0x7f0000006a40)="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", 0x2042, &(0x7f00000069c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000066c0)={0x90, 0x0, 0x0, {0x4, 0x0, 0x0, 0x0, 0x0, 0x0, {0x0, 0xfffffffffffffffe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}}}, 0x0, 0x0, 0x0, 0x0}) openat(0xffffffffffffff9c, &(0x7f0000004400)='./file0/file0\x00', 0x0, 0x0) [ 670.354740][T14126] loop2: detected capacity change from 0 to 208 11:51:43 executing program 0: syz_emit_ethernet(0x15, &(0x7f0000000100)={@multicast, @multicast, @val={@void, {0x8100, 0x1}}, {@llc={0x4, {@llc={0x0, 0x0, "c0"}}}}}, 0x0) 11:51:43 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f00000000c0)={0x9}, 0x40) [ 670.592654][T14126] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 670.592654][T14126] [ 670.614266][T14126] ERROR: (device loop2): remounting filesystem as read-only [ 670.690427][T14126] xtLookup: xtSearch returned -5 11:51:43 executing program 1: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, 0x0) [ 670.715032][T14133] loop3: detected capacity change from 0 to 61456 [ 670.725248][T14126] read_mapping_page failed! 11:51:43 executing program 4: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$IPT_SO_SET_REPLACE(r0, 0x0, 0x40, &(0x7f0000000300)=ANY=[@ANYBLOB="726177000000000000000000000000000000000000000000000000000000000008f80000030000003003000098020000000000000000000000000000000000009802000098020000980200009802000098020000030080000000000000000000ffffffffe00000010000000000000000e4000000010000000000bd00000000007465616d5f736c6176655f310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000c001080200000000000000000000000000000000000000005001686173686c696d6974000000000000000000000000000000000000000002726f736530000000000000000000000000000000000000000000000000000000000000e4ff0800000000000000000000000000000000000000000000000000000000000000000000000000000000000e00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000000000000000000000000000000000000000000fcffffffffffffff00000000000000000000000003000000070000000000000000000000000000004800435400000000000000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000000000000000000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000009000000000000000000000000000000200000000000000000000000000400000000000000000000000000000070009000000000094100000000000000000000000000000020004e4f545241434b0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000980000000000000000000000000000000000000000002800000000000000004000000000000000000000000000000000000000000000feffffff"], 0x1) syz_emit_ethernet(0x3a, &(0x7f0000000040)={@broadcast, @dev, @void, {@ipv4={0x800, @tcp={{0x5, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x6, 0x0, @loopback, @local}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x6, 0x6, 0x18, 0x0, 0x0, 0x0, {[@nop]}}}}}}}, 0x0) [ 670.784963][T14126] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 670.828151][T14126] Mount JFS Failure: -5 [ 670.833376][T14126] jfs_mount failed w/return code = -5 11:51:43 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r0, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:44 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:44 executing program 0: r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) futimesat(r0, 0x0, 0x0) [ 671.483707][T14154] loop2: detected capacity change from 0 to 208 [ 671.729632][T14154] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 671.729632][T14154] [ 671.743800][T14154] ERROR: (device loop2): remounting filesystem as read-only [ 671.752906][T14154] xtLookup: xtSearch returned -5 11:51:44 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:44 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockname(r0, &(0x7f0000000b80)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff}}, &(0x7f0000000c00)=0x80) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x40049409, 0x0) 11:51:44 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000340)={'ip6tnl0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @mcast2, @private0}}) [ 671.804478][T14154] read_mapping_page failed! [ 671.845205][T14154] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 671.913037][T14154] Mount JFS Failure: -5 11:51:44 executing program 1: syz_mount_image$exfat(&(0x7f0000005c00), &(0x7f0000005c40)='./file0\x00', 0x0, 0x0, &(0x7f0000006cc0), 0x0, &(0x7f0000006d00)) [ 671.938723][T14154] jfs_mount failed w/return code = -5 11:51:44 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:44 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$sock_inet6_tcp_SIOCATMARK(r0, 0x8902, &(0x7f0000002480)) ioctl$sock_inet6_tcp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000000)) [ 671.992202][T14144] syz-executor.4: vmalloc error: size 15646720, page order 0, failed to allocate pages, mode:0xdc0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0-1 [ 672.117430][T14162] exFAT-fs (loop1): invalid boot record signature [ 672.136746][T14162] exFAT-fs (loop1): failed to read boot sector [ 672.153071][T14162] exFAT-fs (loop1): failed to recognize exfat type [ 672.198915][T14144] CPU: 1 PID: 14144 Comm: syz-executor.4 Not tainted 5.16.0-rc4-syzkaller #0 [ 672.207732][T14144] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 672.217805][T14144] Call Trace: [ 672.221098][T14144] [ 672.224038][T14144] dump_stack_lvl+0xcd/0x134 [ 672.228810][T14144] warn_alloc.cold+0x87/0x17a [ 672.233538][T14144] ? zone_watermark_ok_safe+0x290/0x290 [ 672.239202][T14144] ? lockdep_hardirqs_on+0x79/0x100 [ 672.244483][T14144] ? alloc_pages+0x35/0x300 [ 672.249060][T14144] ? __vmalloc_node_range+0x574/0xab0 [ 672.254453][T14144] __vmalloc_node_range+0x883/0xab0 [ 672.259668][T14144] ? vfree_atomic+0xe0/0xe0 [ 672.264203][T14144] ? kvfree+0x42/0x50 [ 672.268216][T14144] ? lockdep_hardirqs_on+0x79/0x100 [ 672.273426][T14144] ? xt_counters_alloc+0x4c/0x70 [ 672.278426][T14144] vzalloc+0x67/0x80 [ 672.282329][T14144] ? xt_counters_alloc+0x4c/0x70 [ 672.287269][T14144] xt_counters_alloc+0x4c/0x70 [ 672.292040][T14144] __do_replace+0x9a/0x870 [ 672.296512][T14144] ? ipt_unregister_table_exit+0x40/0x40 [ 672.302170][T14144] do_ipt_set_ctl+0x901/0xb80 [ 672.306851][T14144] ? __mutex_lock+0x21a/0x12f0 [ 672.311618][T14144] ? compat_do_replace.constprop.0+0x470/0x470 [ 672.317786][T14144] ? wait_for_completion_io+0x270/0x270 [ 672.323343][T14144] ? nf_sockopt_find.constprop.0+0x22d/0x2a0 [ 672.329378][T14144] nf_setsockopt+0x83/0xe0 [ 672.333800][T14144] ip_setsockopt+0x3c3/0x3a90 [ 672.338518][T14144] ? ip_ra_control+0x560/0x560 [ 672.343287][T14144] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 672.349570][T14144] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 672.355821][T14144] ? avc_has_perm+0x107/0x1b0 [ 672.360538][T14144] ? avc_has_perm_noaudit+0x390/0x390 [ 672.365910][T14144] ? tcp_setsockopt+0x136/0x2520 [ 672.370870][T14144] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 672.377205][T14144] tcp_setsockopt+0x136/0x2520 [ 672.381975][T14144] ? sock_has_perm+0x1eb/0x280 [ 672.386741][T14144] ? tcp_sock_set_keepidle+0x40/0x40 [ 672.392123][T14144] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 672.398372][T14144] ? selinux_netlbl_socket_setsockopt+0x9e/0x420 [ 672.404759][T14144] ? selinux_netlbl_sock_rcv_skb+0x530/0x530 [ 672.410742][T14144] ? __fget_files+0x2f0/0x4c0 [ 672.415440][T14144] ? selinux_socket_setsockopt+0x6a/0x80 [ 672.421107][T14144] ? sock_common_setsockopt+0x2b/0x100 [ 672.426619][T14144] __sys_setsockopt+0x2db/0x610 [ 672.431471][T14144] ? sock_common_recvmsg+0x1a0/0x1a0 [ 672.436757][T14144] ? __ia32_sys_recv+0x100/0x100 [ 672.441693][T14144] ? lock_downgrade+0x6e0/0x6e0 [ 672.446595][T14144] ? lock_downgrade+0x6e0/0x6e0 [ 672.451447][T14144] __x64_sys_setsockopt+0xba/0x150 [ 672.456559][T14144] ? syscall_enter_from_user_mode+0x21/0x70 [ 672.462460][T14144] do_syscall_64+0x35/0xb0 [ 672.466878][T14144] entry_SYSCALL_64_after_hwframe+0x44/0xae [ 672.472828][T14144] RIP: 0033:0x7fb143fc2e99 [ 672.477242][T14144] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 11:51:45 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) [ 672.496850][T14144] RSP: 002b:00007fb142938168 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 672.505267][T14144] RAX: ffffffffffffffda RBX: 00007fb1440d5f60 RCX: 00007fb143fc2e99 [ 672.513237][T14144] RDX: 0000000000000040 RSI: 0000000000000000 RDI: 0000000000000003 [ 672.521202][T14144] RBP: 00007fb14401d031 R08: 0000000000000001 R09: 0000000000000000 [ 672.529171][T14144] R10: 0000000020000300 R11: 0000000000000246 R12: 0000000000000000 [ 672.537142][T14144] R13: 00007ffd5ac575af R14: 00007fb142938300 R15: 0000000000022000 [ 672.545112][T14144] 11:51:45 executing program 1: syz_emit_ethernet(0x62, &(0x7f0000000100)={@empty, @link_local, @val={@void}, {@mpls_mc={0x8847, {[], @ipv6=@tipc_packet={0x0, 0x6, 'Ofx', 0x28, 0x6, 0x0, @local, @empty, {[], @payload_named={{{{{0x28, 0x0, 0x0, 0x0, 0x0, 0xa}}}}}}}}}}}, 0x0) [ 672.644579][T14144] Mem-Info: [ 672.648198][T14144] active_anon:485 inactive_anon:166016 isolated_anon:0 [ 672.648198][T14144] active_file:4063 inactive_file:46807 isolated_file:0 [ 672.648198][T14144] unevictable:768 dirty:40 writeback:0 [ 672.648198][T14144] slab_reclaimable:21062 slab_unreclaimable:113809 [ 672.648198][T14144] mapped:27574 shmem:2011 pagetables:1447 bounce:0 [ 672.648198][T14144] kernel_misc_reclaimable:0 [ 672.648198][T14144] free:1240775 free_pcp:10574 free_cma:0 [ 672.658066][T14171] loop3: detected capacity change from 0 to 61456 [ 672.741809][T14144] Node 0 active_anon:1932kB inactive_anon:663156kB active_file:16180kB inactive_file:187228kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:110296kB dirty:156kB writeback:0kB shmem:5592kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 598016kB writeback_tmp:0kB kernel_stack:10416kB pagetables:5780kB all_unreclaimable? no [ 672.804654][T14174] loop2: detected capacity change from 0 to 208 [ 672.885486][T14174] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 672.885486][T14174] [ 672.971879][T14144] Node 1 active_anon:8kB inactive_anon:908kB active_file:72kB inactive_file:0kB unevictable:1536kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:2452kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB kernel_stack:16kB pagetables:8kB all_unreclaimable? no [ 673.002941][T14174] ERROR: (device loop2): remounting filesystem as read-only [ 673.072247][T14174] xtLookup: xtSearch returned -5 [ 673.104042][T14144] Node 0 DMA free:15360kB boost:0kB min:200kB low:248kB high:296kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15360kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 673.109884][T14174] read_mapping_page failed! [ 673.161376][T14144] lowmem_reserve[]: 0 2645 2645 2645 2645 [ 673.185043][T14174] jfs_mount: dbMount failed w/rc = -5 [ 673.186484][T14144] Node 0 DMA32 free:999124kB boost:0kB min:35676kB low:44592kB high:53508kB reserved_highatomic:0KB active_anon:1932kB inactive_anon:663200kB active_file:16180kB inactive_file:187228kB unevictable:1536kB writepending:156kB present:3129332kB managed:2716812kB mlocked:0kB bounce:0kB free_pcp:40596kB local_pcp:18564kB free_cma:0kB [ 673.228424][T14174] Mount JFS Failure: -5 [ 673.376391][T14144] lowmem_reserve[]: 0 0 0 0 0 [ 673.403827][T14144] Node 0 Normal free:0kB boost:0kB min:4kB low:4kB high:4kB reserved_highatomic:0KB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:1048576kB managed:400kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 673.433004][T14174] jfs_mount failed w/return code = -5 [ 673.525198][T14144] lowmem_reserve[]: 0 0 0 0 0 [ 673.542992][T14144] Node 1 Normal free:3950256kB boost:0kB min:54224kB low:67780kB high:81336kB reserved_highatomic:0KB active_anon:8kB inactive_anon:908kB active_file:72kB inactive_file:0kB unevictable:1536kB writepending:4kB present:4194304kB managed:4117620kB mlocked:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 673.593778][T14144] lowmem_reserve[]: 0 0 0 0 0 [ 673.602394][T14144] Node 0 DMA: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15360kB [ 673.627301][T14144] Node 0 DMA32: 319*4kB (UME) 699*8kB (UME) 1170*16kB (UME) 384*32kB (UME) 132*64kB (UME) 30*128kB (UM) 5*256kB (ME) 2*512kB (UM) 0*1024kB 4*2048kB (UME) 229*4096kB (UM) = 998644kB [ 673.671647][T14144] Node 0 Normal: 0*4kB 0*8kB 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 0kB [ 673.716661][T14144] Node 1 Normal: 122*4kB (UME) 189*8kB (UME) 144*16kB (UME) 83*32kB (UE) 56*64kB (UME) 35*128kB (UM) 14*256kB (U) 5*512kB (U) 1*1024kB (E) 2*2048kB (M) 958*4096kB (M) = 3950256kB [ 673.794444][T14144] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 673.804414][T14144] Node 0 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 673.842138][T14144] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 673.882522][T14144] Node 1 hugepages_total=2 hugepages_free=2 hugepages_surp=0 hugepages_size=2048kB [ 673.913763][T14144] 13903 total pagecache pages [ 673.919044][T14144] 0 pages in swap cache [ 673.923393][T14144] Swap cache stats: add 0, delete 0, find 0/0 [ 674.020340][T14144] Free swap = 0kB [ 674.024104][T14144] Total swap = 0kB [ 674.104350][T14144] 2097051 pages RAM [ 674.143987][T14144] 0 pages HighMem/MovableOnly [ 674.470857][T14144] 384503 pages reserved [ 674.475050][T14144] 0 pages cma reserved 11:51:47 executing program 4: capset(&(0x7f0000000000)={0x19980330}, &(0x7f0000003c80)) delete_module(0x0, 0x0) 11:51:47 executing program 0: sendmsg$NL802154_CMD_GET_INTERFACE(0xffffffffffffffff, 0x0, 0xcf2df446dde9c356) 11:51:47 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x22, &(0x7f0000000280), 0x4) 11:51:47 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:47 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:47 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:47 executing program 1: io_uring_setup(0xcaad5b2, &(0x7f0000000180)={0x0, 0x0, 0x10}) 11:51:48 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) semtimedop(r0, &(0x7f00000001c0)=[{0x0, 0xffff}], 0x1, &(0x7f0000000200)={0x77359400}) [ 675.065992][T14186] loop2: detected capacity change from 0 to 208 [ 675.125670][T14184] loop3: detected capacity change from 0 to 61456 [ 675.169138][T14192] capability: warning: `syz-executor.4' uses 32-bit capabilities (legacy support in use) [ 675.435897][T14184] jfs_mount: dbMount failed w/rc = -5 [ 675.468674][T14184] Mount JFS Failure: -5 11:51:48 executing program 1: syz_emit_ethernet(0xfc0, &(0x7f00000005c0)={@empty, @local, @void, {@llc={0x4, {@llc={0x0, 0x0, "02", "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"}}}}}, 0x0) [ 675.496683][T14184] jfs_mount failed w/return code = -5 [ 675.497154][T14186] jfs_mount: diMount failed w/rc = -5 11:51:48 executing program 4: capset(&(0x7f0000003c40)={0x20071026}, &(0x7f0000003c80)) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{}]}) [ 675.577348][T14186] Mount JFS Failure: -5 [ 675.601600][T14186] jfs_mount failed w/return code = -5 11:51:48 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, 0x0, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:48 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x0, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) [ 675.833354][T14202] capability: warning: `syz-executor.4' uses deprecated v2 capabilities in a way that may be insecure 11:51:48 executing program 1: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000003540), 0x0, 0x0) r1 = syz_io_uring_setup(0x72cf, &(0x7f0000000b80), &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000000c00), &(0x7f0000000c40)) dup2(r0, r1) 11:51:48 executing program 4: syz_mount_image$squashfs(0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000080)="1e", 0xffffff1f}], 0x0, 0x0) [ 676.018054][T14207] loop2: detected capacity change from 0 to 208 11:51:49 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:49 executing program 0: syz_emit_ethernet(0x26, &(0x7f0000000640)={@random="adc7c8e86a3e", @broadcast, @val={@void}, {@ipv4={0x800, @generic={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @multicast1, @empty}}}}}, 0x0) [ 676.180503][T14207] jfs_mount: diMount failed w/rc = -5 [ 676.237659][T14207] Mount JFS Failure: -5 [ 676.242415][T14207] jfs_mount failed w/return code = -5 11:51:49 executing program 0: process_vm_readv(0xffffffffffffffff, &(0x7f00000012c0)=[{&(0x7f0000000040)=""/83, 0x53}, {&(0x7f00000000c0)=""/20, 0x14}, {&(0x7f0000000100)=""/62, 0x3e}, {&(0x7f0000000140)=""/4096, 0x1000}, {&(0x7f0000001140)=""/195, 0xfffffffffffffd88}, {&(0x7f0000001240)=""/85, 0x55}], 0x6, &(0x7f00000024c0)=[{&(0x7f0000001340)=""/31, 0x1f}, {&(0x7f0000001380)=""/4096, 0x1000}, {&(0x7f00000026c0)=""/8, 0x8}, {&(0x7f00000023c0)=""/223, 0xdf}], 0x4, 0x0) 11:51:49 executing program 1: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, @in={0x2, 0x0, @remote}, @ax25={0x3, @bcast}, @nl}) 11:51:49 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:49 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x0, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:49 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) recvmmsg(r0, &(0x7f00000007c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x2060, 0x0) 11:51:49 executing program 1: syz_io_uring_setup(0xcd9, &(0x7f0000000200), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) [ 676.517038][T14224] loop3: detected capacity change from 0 to 61456 [ 676.595497][T14224] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 676.595497][T14224] [ 676.609134][T14225] loop2: detected capacity change from 0 to 208 [ 676.671584][T14224] ERROR: (device loop3): remounting filesystem as read-only 11:51:49 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:49 executing program 0: openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0), 0x0, 0x0) 11:51:49 executing program 1: syslog(0x2, &(0x7f0000000340)=""/64, 0x40) [ 676.870304][T14225] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 676.870304][T14225] [ 676.881874][T14224] xtLookup: xtSearch returned -5 [ 676.890406][T14224] read_mapping_page failed! [ 676.900762][T14224] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 676.922131][T14225] ERROR: (device loop2): remounting filesystem as read-only [ 676.932059][T14224] Mount JFS Failure: -5 [ 676.936665][T14224] jfs_mount failed w/return code = -5 [ 676.942419][T14225] xtLookup: xtSearch returned -5 [ 676.954045][T14225] read_mapping_page failed! [ 676.961178][T14225] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 676.980088][T14225] Mount JFS Failure: -5 [ 677.056800][T14225] jfs_mount failed w/return code = -5 11:51:50 executing program 4: io_setup(0x401, &(0x7f00000000c0)=0x0) r1 = syz_io_uring_setup(0xcd9, &(0x7f0000000200), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000000280), &(0x7f00000002c0)) io_submit(r0, 0x1, &(0x7f0000000380)=[&(0x7f0000000340)={0x0, 0x0, 0x0, 0x1, 0x0, r1, 0x0}]) 11:51:50 executing program 1: r0 = semget$private(0x0, 0x3, 0x0) semtimedop(r0, &(0x7f00000001c0)=[{0x0, 0xffff}], 0x1, 0x0) 11:51:50 executing program 0: r0 = semget$private(0x0, 0x3, 0x0) semop(r0, &(0x7f0000000240)=[{0x0, 0x0, 0x1800}], 0x1) r1 = semget$private(0x0, 0x3, 0x0) semtimedop(r1, &(0x7f00000001c0)=[{0x2, 0x7, 0x1800}, {0x2, 0xf7}, {0x0, 0xffff}], 0x3, &(0x7f0000000200)={0x77359400}) 11:51:50 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:50 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x0, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) [ 677.632346][T14247] loop2: detected capacity change from 0 to 208 11:51:50 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 677.695699][T14247] jfs_mount: diMount failed w/rc = -5 [ 677.703628][T14247] Mount JFS Failure: -5 11:51:50 executing program 4: capset(&(0x7f0000003c40)={0x20071026}, &(0x7f0000000100)) setgid(0xee01) [ 677.782326][T14247] jfs_mount failed w/return code = -5 11:51:50 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:51 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='debugfs\x00', 0x0, 0x0) [ 678.100700][T14248] loop3: detected capacity change from 0 to 61456 [ 678.256651][ T26] audit: type=1400 audit(1639309911.170:289): avc: denied { mount } for pid=14256 comm="syz-executor.4" name="/" dev="debugfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:debugfs_t tclass=filesystem permissive=1 11:51:51 executing program 0: r0 = fsopen(&(0x7f00000004c0)='debugfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0xa5) 11:51:51 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x2, [@var]}}, &(0x7f0000000040)=""/190, 0x2a, 0xbe, 0x1}, 0x20) [ 678.343134][T14255] loop2: detected capacity change from 0 to 208 11:51:51 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000002280)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40, 0x0) [ 678.442281][T14248] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 678.442281][T14248] [ 678.520226][T14248] ERROR: (device loop3): remounting filesystem as read-only [ 678.600889][T14248] xtLookup: xtSearch returned -5 [ 678.696830][T14248] read_mapping_page failed! 11:51:51 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x0, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 678.725764][T14248] jfs_mount: diMount(ipaimap) failed w/rc = -5 11:51:51 executing program 0: capset(&(0x7f0000003c40)={0x20071026}, &(0x7f0000003c80)) ioprio_set$uid(0x3, 0x0, 0x6000) 11:51:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmmsg(r0, &(0x7f0000002280)=[{{0x0, 0x0, 0x0, 0x40000}}], 0x1, 0x0, 0x0) [ 678.808118][T14255] jfs_mount: diMount failed w/rc = -5 [ 678.811918][T14248] Mount JFS Failure: -5 [ 678.859277][T14248] jfs_mount failed w/return code = -5 11:51:51 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:51 executing program 4: syz_open_dev$loop(&(0x7f0000000140), 0x9, 0x303) 11:51:51 executing program 0: capset(&(0x7f0000003c40)={0x20071026}, &(0x7f0000003c80)) ioprio_set$uid(0x3, 0x0, 0x6000) [ 678.908908][T14255] Mount JFS Failure: -5 [ 678.913589][T14255] jfs_mount failed w/return code = -5 11:51:51 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:51 executing program 4: syz_mount_image$squashfs(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x2009050, &(0x7f0000000440)) 11:51:52 executing program 1: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000002180)='/proc/timer_list\x00', 0x0, 0x0) read$FUSE(r0, &(0x7f0000002540)={0x2020}, 0x2020) 11:51:52 executing program 0: capset(&(0x7f0000003c40)={0x20071026}, &(0x7f0000003c80)) ioprio_set$uid(0x3, 0x0, 0x6000) [ 679.276644][T14283] ======================================================= [ 679.276644][T14283] WARNING: The mand mount option has been deprecated and [ 679.276644][T14283] and is ignored by this kernel. Remove the mand [ 679.276644][T14283] option from the mount to silence this warning. [ 679.276644][T14283] ======================================================= [ 679.328848][T14282] loop2: detected capacity change from 0 to 208 [ 679.367065][T14278] loop3: detected capacity change from 0 to 61456 11:51:52 executing program 1: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_open_dev$dri(&(0x7f0000000180), 0x0, 0x0) close(r0) ioctl$DRM_IOCTL_MODE_DESTROY_DUMB(0xffffffffffffffff, 0xc00c642d, &(0x7f0000000100)) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(0xffffffffffffffff, 0xc00c642e, &(0x7f00000004c0)={0x0, 0x5, r0}) ioctl$DRM_IOCTL_GEM_CLOSE(0xffffffffffffffff, 0x40086409, &(0x7f0000000140)={r1}) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/module/dm_thin_pool', 0x20800, 0x80) r2 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) close(r2) 11:51:52 executing program 0: capset(&(0x7f0000003c40)={0x20071026}, &(0x7f0000003c80)) ioprio_set$uid(0x3, 0x0, 0x6000) [ 679.624856][T14278] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 679.624856][T14278] [ 679.689410][T14278] ERROR: (device loop3): remounting filesystem as read-only [ 679.721523][T14278] xtLookup: xtSearch returned -5 [ 679.737447][T14282] jfs_mount: diMount failed w/rc = -5 [ 679.761460][T14278] read_mapping_page failed! [ 679.762134][T14282] Mount JFS Failure: -5 [ 679.783249][T14278] jfs_mount: diMount(ipaimap) failed w/rc = -5 11:51:52 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:52 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x2, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000100)=""/128, 0x26, 0x80, 0x1}, 0x20) 11:51:52 executing program 0: ioprio_set$uid(0x3, 0x0, 0x6000) [ 679.792101][ T26] audit: type=1400 audit(1639309912.710:290): avc: denied { read } for pid=14289 comm="syz-executor.1" name="card0" dev="devtmpfs" ino=625 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 [ 679.821213][T14278] Mount JFS Failure: -5 [ 679.835179][T14282] jfs_mount failed w/return code = -5 [ 679.872195][T14278] jfs_mount failed w/return code = -5 [ 679.872726][ T26] audit: type=1400 audit(1639309912.710:291): avc: denied { open } for pid=14289 comm="syz-executor.1" path="/dev/dri/card0" dev="devtmpfs" ino=625 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:dri_device_t tclass=chr_file permissive=1 11:51:52 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {0x0, 0x0, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:52 executing program 4: r0 = fsopen(&(0x7f0000000040)='9p\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x5, &(0x7f0000000080)='\']%\x00', &(0x7f00000000c0)='\x00', 0x0) 11:51:52 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x89a0, 0x0) 11:51:53 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:53 executing program 0: ioprio_set$uid(0x3, 0x0, 0x6000) 11:51:53 executing program 1: syz_open_dev$loop(&(0x7f0000000140), 0x0, 0x303) 11:51:53 executing program 4: r0 = socket$netlink(0x10, 0x3, 0xf) sendmsg$TIPC_NL_NET_GET(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) [ 680.353564][T14308] loop2: detected capacity change from 0 to 208 11:51:53 executing program 0: ioprio_set$uid(0x3, 0x0, 0x6000) [ 680.465373][T14309] loop3: detected capacity change from 0 to 61456 11:51:53 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x8000000}]}}, &(0x7f0000000100)=""/128, 0x26, 0x80, 0x1}, 0x20) [ 680.724196][T14309] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 680.724196][T14309] [ 680.797426][T14308] jfs_mount: diMount failed w/rc = -5 [ 680.828668][T14308] Mount JFS Failure: -5 [ 680.843996][T14309] ERROR: (device loop3): remounting filesystem as read-only [ 680.866102][T14308] jfs_mount failed w/return code = -5 11:51:53 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:53 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='totmaps\x00') creat(0x0, 0x0) mount(0x0, 0x0, 0x0, 0x0, 0x0) 11:51:53 executing program 0: capset(0x0, &(0x7f0000003c80)) ioprio_set$uid(0x3, 0x0, 0x6000) [ 680.896072][T14309] xtLookup: xtSearch returned -5 [ 680.903515][T14309] read_mapping_page failed! [ 680.912920][T14309] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 680.921951][T14309] Mount JFS Failure: -5 [ 680.928046][T14309] jfs_mount failed w/return code = -5 11:51:54 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {0x0, 0x0, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:54 executing program 1: syz_emit_ethernet(0x2a, &(0x7f0000000080)={@local, @random="a45d0b17d20e", @val, {@ipv4}}, 0x0) 11:51:54 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x0, 0x3, 0x80000001}]}]}}, &(0x7f0000000100)=""/128, 0x32, 0x80, 0x1}, 0x20) 11:51:54 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:54 executing program 0: capset(0x0, &(0x7f0000003c80)) ioprio_set$uid(0x3, 0x0, 0x6000) 11:51:54 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) unlink(&(0x7f0000000080)='./file0\x00') 11:51:54 executing program 4: r0 = epoll_create1(0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) dup2(r0, r1) 11:51:54 executing program 0: capset(0x0, &(0x7f0000003c80)) ioprio_set$uid(0x3, 0x0, 0x6000) [ 681.361685][T14332] loop2: detected capacity change from 0 to 208 [ 681.523604][ T26] audit: type=1400 audit(1639309914.440:292): avc: denied { read } for pid=14338 comm="syz-executor.4" name="binder1" dev="binder" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 681.568379][T14337] loop3: detected capacity change from 0 to 61456 11:51:54 executing program 4: r0 = epoll_create1(0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) dup2(r0, r1) [ 681.627534][ T26] audit: type=1400 audit(1639309914.470:293): avc: denied { open } for pid=14338 comm="syz-executor.4" path="/dev/binderfs/binder1" dev="binder" ino=11 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 681.662479][T14332] jfs_mount: diMount failed w/rc = -5 [ 681.694907][T14332] Mount JFS Failure: -5 [ 681.739746][T14332] jfs_mount failed w/return code = -5 [ 681.864425][ T26] audit: type=1400 audit(1639309914.480:294): avc: denied { ioctl } for pid=14338 comm="syz-executor.4" path="/dev/binderfs/binder1" dev="binder" ino=11 ioctlcmd=0x6208 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:unlabeled_t tclass=chr_file permissive=1 [ 681.865063][T14337] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 681.865063][T14337] 11:51:54 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:54 executing program 0: capset(&(0x7f0000003c40), &(0x7f0000003c80)) ioprio_set$uid(0x3, 0x0, 0x6000) 11:51:54 executing program 1: r0 = epoll_create1(0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) dup2(r0, r1) [ 682.190714][T14337] ERROR: (device loop3): remounting filesystem as read-only [ 682.217150][T14337] xtLookup: xtSearch returned -5 [ 682.333976][T14337] read_mapping_page failed! [ 682.340802][T14337] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 682.368130][T14337] Mount JFS Failure: -5 [ 682.372720][T14337] jfs_mount failed w/return code = -5 11:51:55 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {0x0, 0x0, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:55 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:55 executing program 4: r0 = epoll_create1(0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) dup2(r0, r1) 11:51:55 executing program 0: capset(&(0x7f0000003c40), &(0x7f0000003c80)) ioprio_set$uid(0x3, 0x0, 0x6000) 11:51:55 executing program 1: r0 = epoll_create1(0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) dup2(r0, r1) 11:51:55 executing program 0: capset(&(0x7f0000003c40), &(0x7f0000003c80)) ioprio_set$uid(0x3, 0x0, 0x6000) 11:51:55 executing program 4: r0 = epoll_create1(0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) dup2(r0, r1) 11:51:55 executing program 1: r0 = epoll_create1(0x0) r1 = openat$binderfs(0xffffffffffffff9c, &(0x7f0000000000)='./binderfs/binder1\x00', 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000080)) ioctl$BINDER_THREAD_EXIT(r1, 0x40046208, 0x0) dup2(r0, r1) [ 682.800733][T14366] loop2: detected capacity change from 0 to 208 [ 682.896416][T14366] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 682.896416][T14366] 11:51:55 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 682.999071][T14366] ERROR: (device loop2): remounting filesystem as read-only 11:51:56 executing program 0: capset(&(0x7f0000003c40)={0x20071026}, 0x0) ioprio_set$uid(0x3, 0x0, 0x6000) [ 683.066542][T14366] xtLookup: xtSearch returned -5 [ 683.079776][T14368] loop3: detected capacity change from 0 to 61456 [ 683.129902][T14366] read_mapping_page failed! 11:51:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:56 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0xce, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open(0x0, 0x0, 0x0) r0 = gettid() process_vm_writev(r0, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) [ 683.226395][T14366] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 683.297657][T14366] Mount JFS Failure: -5 [ 683.350095][T14366] jfs_mount failed w/return code = -5 [ 683.389561][T14368] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 683.389561][T14368] [ 683.512566][T14368] ERROR: (device loop3): remounting filesystem as read-only [ 683.546808][T14368] xtLookup: xtSearch returned -5 [ 683.557498][T14368] read_mapping_page failed! [ 683.562803][T14368] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 683.589284][T14368] Mount JFS Failure: -5 [ 683.594128][T14368] jfs_mount failed w/return code = -5 11:51:56 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000), 0x0, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:56 executing program 0: capset(&(0x7f0000003c40)={0x20071026}, 0x0) ioprio_set$uid(0x3, 0x0, 0x6000) 11:51:56 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8993, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 11:51:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(0x0) write(0xffffffffffffffff, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:56 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct]}}, &(0x7f0000000100)=""/128, 0x26, 0x80, 0x1}, 0x20) 11:51:56 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:56 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0x10, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}}, &(0x7f0000000100)=""/128, 0x1a, 0x80, 0x1}, 0x20) 11:51:57 executing program 1: bpf$BPF_BTF_LOAD(0x7, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x1}, 0x20) 11:51:57 executing program 0: capset(&(0x7f0000003c40)={0x20071026}, 0x0) ioprio_set$uid(0x3, 0x0, 0x6000) [ 684.112897][T14395] loop2: detected capacity change from 0 to 208 11:51:57 executing program 4: r0 = socket$key(0xf, 0x3, 0x2) sendmsg$key(r0, &(0x7f0000000080)={0x800000000000000, 0x0, &(0x7f0000000040)={&(0x7f0000000000)={0x2, 0x7, 0x0, 0x0, 0x2}, 0x10}}, 0x0) 11:51:57 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) [ 684.401115][T14395] jfs_mount: diMount failed w/rc = -5 [ 684.410198][T14395] Mount JFS Failure: -5 [ 684.414929][T14395] jfs_mount failed w/return code = -5 [ 684.592900][T14408] loop2: detected capacity change from 0 to 208 [ 684.693978][ T26] audit: type=1400 audit(1639309917.600:295): avc: denied { create } for pid=14409 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 684.746318][ T26] audit: type=1400 audit(1639309917.620:296): avc: denied { write } for pid=14409 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=key_socket permissive=1 [ 684.760878][T14405] loop3: detected capacity change from 0 to 61456 [ 684.823381][T14408] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 684.823381][T14408] [ 684.861896][T14408] ERROR: (device loop2): remounting filesystem as read-only [ 684.928225][T14408] xtLookup: xtSearch returned -5 [ 684.939595][T14405] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 684.939595][T14405] [ 684.957729][T14405] ERROR: (device loop3): remounting filesystem as read-only [ 684.973063][T14405] xtLookup: xtSearch returned -5 [ 684.982629][T14408] read_mapping_page failed! [ 684.982695][T14408] jfs_mount: dbMount failed w/rc = -5 [ 684.998235][T14408] Mount JFS Failure: -5 [ 684.998274][T14408] jfs_mount failed w/return code = -5 [ 685.027585][T14405] read_mapping_page failed! [ 685.033337][T14405] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 685.042475][T14405] Mount JFS Failure: -5 [ 685.047873][T14405] jfs_mount failed w/return code = -5 11:51:58 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000), 0x0, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:58 executing program 1: getpgrp(0xffffffffffffffff) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000080), 0xffffffffffffffff) r0 = getpgrp(0xffffffffffffffff) sched_rr_get_interval(r0, &(0x7f0000000380)) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000040)={0xb, {'syz1\x00', 'syz1\x00', 'syz1\x00', 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "9e"}}, 0x119) fork() 11:51:58 executing program 0: capset(&(0x7f0000003c40)={0x20071026}, &(0x7f0000003c80)) ioprio_set$uid(0x0, 0x0, 0x6000) 11:51:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:58 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:58 executing program 0: capset(&(0x7f0000003c40)={0x20071026}, &(0x7f0000003c80)) ioprio_set$uid(0x0, 0x0, 0x6000) 11:51:58 executing program 1: r0 = socket$netlink(0x2, 0x3, 0xf) setsockopt$netlink_NETLINK_NO_ENOBUFS(r0, 0x10e, 0x5, 0x0, 0x0) 11:51:58 executing program 4: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) [ 685.566733][ T1230] ieee802154 phy0 wpan0: encryption failed: -22 [ 685.573101][ T1230] ieee802154 phy1 wpan1: encryption failed: -22 11:51:58 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) [ 685.939706][T14427] loop3: detected capacity change from 0 to 61456 11:51:58 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff}) write(0xffffffffffffffff, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:51:59 executing program 0: capset(&(0x7f0000003c40)={0x20071026}, &(0x7f0000003c80)) ioprio_set$uid(0x0, 0x0, 0x6000) [ 686.079784][T14428] loop2: detected capacity change from 0 to 208 11:51:59 executing program 0: capset(&(0x7f0000003c40)={0x20071026}, &(0x7f0000003c80)) ioprio_set$uid(0x3, 0x0, 0x0) [ 686.373850][T14428] Mount JFS Failure: -22 [ 686.409339][T14428] jfs_mount failed w/return code = -22 [ 686.457269][ T26] audit: type=1400 audit(1639309919.370:297): avc: denied { mount } for pid=14484 comm="syz-executor.4" name="/" dev="bpf" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:bpf_t tclass=filesystem permissive=1 [ 686.534439][T14427] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 686.534439][T14427] [ 686.559553][T14427] ERROR: (device loop3): remounting filesystem as read-only [ 686.569772][T14427] xtLookup: xtSearch returned -5 [ 686.575456][T14427] read_mapping_page failed! [ 686.581205][T14427] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 686.590671][T14427] Mount JFS Failure: -5 [ 686.596466][T14427] jfs_mount failed w/return code = -5 11:51:59 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000), 0x0, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:51:59 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_ipv6_tunnel_SIOCCHG6RD(r0, 0x8927, &(0x7f0000000080)={'ip6_vti0\x00', 0x0}) 11:51:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) 11:51:59 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:51:59 executing program 4: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 11:51:59 executing program 0: clock_gettime(0x9, &(0x7f0000000240)) 11:51:59 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) 11:51:59 executing program 0: clock_gettime(0x6, &(0x7f0000002780)) 11:51:59 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 686.921101][T14501] loop3: detected capacity change from 0 to 61456 11:51:59 executing program 4: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) [ 686.963842][T14505] loop2: detected capacity change from 0 to 208 11:52:00 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x1c, 0x1c, 0x2, [@func_proto={0x0, 0x2, 0x0, 0xd, 0x0, [{0xb}, {0x0, 0x4}]}]}}, &(0x7f0000000100)=""/128, 0x36, 0x80, 0x1}, 0x20) [ 687.170274][T14501] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 687.170274][T14501] 11:52:00 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc0105303, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) [ 687.310360][T14501] ERROR: (device loop3): remounting filesystem as read-only [ 687.321348][T14501] xtLookup: xtSearch returned -5 [ 687.333212][T14501] read_mapping_page failed! [ 687.340486][T14501] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 687.350454][T14501] Mount JFS Failure: -5 [ 687.355263][T14501] jfs_mount failed w/return code = -5 11:52:00 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200"/32, 0x20, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:00 executing program 4: r0 = fsopen(&(0x7f0000000040)='bpf\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 11:52:00 executing program 0: r0 = getpgrp(0xffffffffffffffff) r1 = fork() waitid(0x1, r1, 0x0, 0x8, &(0x7f0000000000)) process_vm_writev(r0, &(0x7f0000000400)=[{&(0x7f0000000280)=""/181, 0xb5}, {&(0x7f0000000340)=""/47, 0x2f}], 0x2, &(0x7f0000002700)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, 0x0) [ 687.475848][T14505] jfs_mount: diMount failed w/rc = -5 [ 687.493676][ T3784] udevd[3784]: inotify_add_watch(7, /dev/loop5p4, 10) failed: No such file or directory [ 687.627178][T14505] Mount JFS Failure: -5 [ 687.631467][T14505] jfs_mount failed w/return code = -5 [ 687.666025][ T3779] udevd[3779]: inotify_add_watch(7, /dev/loop5p2, 10) failed: No such file or directory 11:52:00 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:52:00 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x14, 0x14, 0x2, [@func_proto={0x0, 0x1, 0x0, 0xd, 0x0, [{0xb}]}]}}, &(0x7f0000000100)=""/128, 0x2e, 0x80, 0x1}, 0x20) 11:52:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@volatile]}}, &(0x7f0000000340)=""/242, 0x26, 0xf2, 0x1}, 0x20) 11:52:00 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x20, 0x20, 0x8, [@var={0x4, 0x0, 0x0, 0xe, 0x1}, @var={0x7}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x5f, 0x0]}}, &(0x7f00000001c0)=""/233, 0x40, 0xe9, 0x1}, 0x20) 11:52:00 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001140)={0xffffffffffffffff, 0xffffffffffffffff}) shutdown(r0, 0x2) [ 687.838968][T14529] loop3: detected capacity change from 0 to 61456 11:52:00 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 687.964838][T14539] loop2: detected capacity change from 0 to 208 11:52:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x7, [@fwd={0x6}]}, {0x0, [0x0, 0x0, 0x0, 0x0, 0x0]}}, &(0x7f0000000100)=""/181, 0x2b, 0xb5, 0x1}, 0x20) [ 688.215636][T14529] read_mapping_page failed! [ 688.282582][T14529] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 688.292380][T14529] Mount JFS Failure: -5 [ 688.297582][T14529] jfs_mount failed w/return code = -5 11:52:01 executing program 4: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) [ 688.417268][T14539] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 688.417268][T14539] 11:52:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x4, [@struct={0x3, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}, {0x0, [0x0, 0x0]}}, &(0x7f0000000100)=""/128, 0x34, 0x80, 0x1}, 0x20) [ 688.530166][T14539] ERROR: (device loop2): remounting filesystem as read-only [ 688.542824][T14539] xtLookup: xtSearch returned -5 [ 688.549375][T14539] read_mapping_page failed! [ 688.554469][T14539] jfs_mount: diMount(ipaimap) failed w/rc = -5 11:52:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0xc, 0xc, 0x2, [@struct={0x0, 0x0, 0x8}]}}, &(0x7f0000000100)=""/128, 0x26, 0x80, 0x1}, 0x20) 11:52:01 executing program 0: r0 = getpgrp(0xffffffffffffffff) r1 = fork() waitid(0x1, r1, 0x0, 0x8, &(0x7f0000000000)) process_vm_writev(r0, &(0x7f0000000400)=[{&(0x7f0000000280)=""/181, 0xb5}, {&(0x7f0000000340)=""/47, 0x2f}], 0x2, &(0x7f0000002700)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, 0x0) 11:52:01 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200"/32, 0x20, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 688.596121][T14539] Mount JFS Failure: -5 [ 688.609041][T14539] jfs_mount failed w/return code = -5 11:52:01 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:52:01 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, 0x0, 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:52:01 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x3, 0x0, 0x0, [{}]}]}}, &(0x7f0000000100)=""/128, 0x32, 0x80, 0x1}, 0x20) 11:52:01 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x0, 0x0, 0x2}, {0x0, [], 0x1d}}, &(0x7f0000000100)=""/128, 0x1a, 0x80, 0x1}, 0x20) [ 688.890330][T14555] loop2: detected capacity change from 0 to 208 [ 689.078453][T14566] loop3: detected capacity change from 0 to 61456 11:52:02 executing program 0: r0 = getpgrp(0xffffffffffffffff) r1 = fork() waitid(0x1, r1, 0x0, 0x8, &(0x7f0000000000)) process_vm_writev(r0, &(0x7f0000000400)=[{&(0x7f0000000280)=""/181, 0xb5}, {&(0x7f0000000340)=""/47, 0x2f}], 0x2, &(0x7f0000002700)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, 0x0) 11:52:02 executing program 4: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000001c0)={&(0x7f0000000140)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@func_proto, @volatile]}}, &(0x7f0000000340)=""/242, 0x32, 0xf2, 0x1}, 0x20) [ 689.169211][T14555] jfs_mount: diMount failed w/rc = -5 11:52:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000040)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x7, [@var={0x4, 0x0, 0x0, 0xe, 0x1}]}, {0x0, [0x0, 0x0, 0x0, 0x5f, 0x5f]}}, &(0x7f00000001c0)=""/233, 0x2f, 0xe9, 0x1}, 0x20) [ 689.225929][T14566] read_mapping_page failed! [ 689.233562][T14566] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 689.237143][T14555] Mount JFS Failure: -5 [ 689.243074][T14566] Mount JFS Failure: -5 [ 689.249434][T14566] jfs_mount failed w/return code = -5 [ 689.263127][T14555] jfs_mount failed w/return code = -5 11:52:02 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) 11:52:02 executing program 4: socket$netlink(0x2, 0xa, 0x0) 11:52:02 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200"/32, 0x20, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:02 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:52:02 executing program 1: r0 = fsopen(&(0x7f00000004c0)='debugfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x80) [ 689.650877][T14586] loop3: detected capacity change from 0 to 61456 11:52:02 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f00000000c0)='./bus\x00', 0x6000, 0x1) creat(&(0x7f0000000180)='./bus\x00', 0x0) 11:52:02 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 689.760028][T14586] read_mapping_page failed! [ 689.766423][T14586] jfs_mount: diMount(ipaimap) failed w/rc = -5 11:52:02 executing program 0: r0 = getpgrp(0xffffffffffffffff) r1 = fork() waitid(0x1, r1, 0x0, 0x8, &(0x7f0000000000)) process_vm_writev(r0, &(0x7f0000000400)=[{&(0x7f0000000280)=""/181, 0xb5}, {&(0x7f0000000340)=""/47, 0x2f}], 0x2, &(0x7f0000002700)=[{&(0x7f0000000580)=""/4096, 0x1000}], 0x1, 0x0) [ 689.867709][T14586] Mount JFS Failure: -5 [ 689.872611][T14586] jfs_mount failed w/return code = -5 [ 689.945262][ T26] audit: type=1400 audit(1639309922.860:298): avc: denied { create } for pid=14594 comm="syz-executor.4" name="bus" scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=blk_file permissive=1 [ 689.979197][T14592] loop2: detected capacity change from 0 to 208 11:52:02 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x5, [@struct={0x3, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x10}]}]}, {0x0, [0x0, 0x0, 0x35f86991849298d6]}}, &(0x7f0000000100)=""/128, 0x35, 0x80, 0x1}, 0x20) [ 690.057491][ T26] audit: type=1400 audit(1639309922.860:299): avc: denied { write } for pid=14594 comm="syz-executor.4" name="bus" dev="sda1" ino=1205 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=blk_file permissive=1 11:52:03 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') preadv(r0, &(0x7f0000000080)=[{&(0x7f0000000280)=""/76, 0xff0d}], 0x1, 0x0, 0x0) [ 690.097610][ T26] audit: type=1400 audit(1639309922.860:300): avc: denied { open } for pid=14594 comm="syz-executor.4" path="/root/syzkaller-testdir614735524/syzkaller.89FrDr/793/bus" dev="sda1" ino=1205 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=blk_file permissive=1 11:52:03 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009000000", 0x30, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 690.166310][ T26] audit: type=1400 audit(1639309923.080:301): avc: denied { unlink } for pid=3633 comm="syz-executor.4" name="bus" dev="sda1" ino=1205 scontext=root:sysadm_r:sysadm_t tcontext=root:object_r:user_home_t tclass=blk_file permissive=1 11:52:03 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7770, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr=0x59c}, 0x10) 11:52:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r0) execve(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000440)=[0x0]) [ 690.328514][T14592] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 690.328514][T14592] [ 690.456756][T14592] ERROR: (device loop2): remounting filesystem as read-only [ 690.529549][T14592] xtLookup: xtSearch returned -5 [ 690.581856][T14592] read_mapping_page failed! [ 690.629873][T14592] jfs_mount: diMount(ipaimap) failed w/rc = -5 11:52:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000040), 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(r0, 0xc08c5332, &(0x7f0000000100)={0x0, 0x0, 0x0, 'queue1\x00'}) 11:52:03 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 690.717700][T14592] Mount JFS Failure: -5 [ 690.722732][T14592] jfs_mount failed w/return code = -5 [ 690.787363][T14607] loop3: detected capacity change from 0 to 61456 11:52:03 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:52:03 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) fadvise64(r1, 0xffffffffffffffff, 0x740d, 0x4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x3, &(0x7f00000007c0)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0x2, 0x200, r1, 0x0, 0x0, 0x800, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x2, 0x0, 0x1}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000002480), 0x0, 0x0, 0x0, 0x0, r2}]) creat(0x0, 0x0) 11:52:03 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r0) execve(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000440)=[0x0]) 11:52:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7770, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr=0x59c}, 0x10) [ 691.137389][T14607] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 691.137389][T14607] [ 691.153508][T14619] loop2: detected capacity change from 0 to 208 [ 691.273699][T14607] ERROR: (device loop3): remounting filesystem as read-only [ 691.322098][T14607] xtLookup: xtSearch returned -5 [ 691.358353][T14607] read_mapping_page failed! [ 691.376546][T14607] jfs_mount: diMount failed w/rc = -5 [ 691.382093][T14619] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 691.382093][T14619] [ 691.390457][T14607] Mount JFS Failure: -5 [ 691.397801][T14607] jfs_mount failed w/return code = -5 [ 691.455073][T14619] ERROR: (device loop2): remounting filesystem as read-only [ 691.488722][T14619] xtLookup: xtSearch returned -5 11:52:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7770, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr=0x59c}, 0x10) [ 691.546478][T14619] read_mapping_page failed! [ 691.556815][T14619] jfs_mount: diMount(ipaimap) failed w/rc = -5 11:52:04 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340), 0x0) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 691.709308][T14619] Mount JFS Failure: -5 [ 691.714143][T14619] jfs_mount failed w/return code = -5 11:52:04 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009000000", 0x30, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:04 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r0) execve(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000440)=[0x0]) 11:52:04 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:52:04 executing program 1: perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7770, 0x0, &(0x7f00000001c0)={0x2, 0x0, @rand_addr=0x59c}, 0x10) 11:52:05 executing program 0: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x22, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000280)='./file0\x00', 0xecf86c37d53049cc) close(r0) execve(&(0x7f0000000080)='./file0\x00', 0x0, &(0x7f0000000440)=[0x0]) [ 692.332297][T14639] loop2: detected capacity change from 0 to 208 11:52:05 executing program 1: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000180)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x18, 0x18, 0x2, [@struct={0x0, 0x1, 0x0, 0x4, 0x0, 0x0, [{0x5000000}]}]}}, &(0x7f0000000100)=""/128, 0x32, 0x80, 0x1}, 0x20) [ 692.595735][T14644] loop3: detected capacity change from 0 to 61456 11:52:05 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb6", 0x56) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 692.945185][T14639] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 692.945185][T14639] [ 692.998269][T14639] ERROR: (device loop2): remounting filesystem as read-only [ 693.005894][T14639] xtLookup: xtSearch returned -5 [ 693.045084][T14639] read_mapping_page failed! [ 693.116545][T14639] jfs_mount: dbMount failed w/rc = -5 [ 693.122281][T14639] Mount JFS Failure: -5 [ 693.156473][T14639] jfs_mount failed w/return code = -5 11:52:06 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) fadvise64(r1, 0xffffffffffffffff, 0x740d, 0x4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x3, &(0x7f00000007c0)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0x2, 0x200, r1, 0x0, 0x0, 0x800, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x2, 0x0, 0x1}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000002480), 0x0, 0x0, 0x0, 0x0, r2}]) creat(0x0, 0x0) 11:52:06 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000180)='net/arp\x00') preadv(r0, &(0x7f00000016c0)=[{&(0x7f0000000000)=""/55, 0x37}], 0x1, 0xfd3, 0x0) 11:52:06 executing program 0: bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000100)={&(0x7f0000000000)={{0xeb9f, 0x1, 0x0, 0x18, 0x0, 0x10, 0x10, 0x6, [@var={0x4}]}, {0x0, [0x0, 0x0, 0x0, 0x5f]}}, &(0x7f0000000040)=""/190, 0x2e, 0xbe, 0x1}, 0x20) 11:52:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb6", 0x56) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:52:06 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:52:06 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009000000", 0x30, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb6", 0x56) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:52:06 executing program 0: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7770, 0x60, &(0x7f00000001c0), 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x8f, 0x0, 0x160, 0x160, 0x62020000, 0x260, 0x260, 0x160, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback=0x7f008e04, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0xb003, 0x130, 0x160, 0x8, {0xf400000000000000}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'kmp\x00', "4bc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x5a}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, 0x0, 0x0) 11:52:06 executing program 1: r0 = fsopen(&(0x7f0000000000)='bpf\x00', 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/cpuinfo\x00', 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000040)=',@#-{/#\x00', &(0x7f0000000080)='./file0\x00', r1) 11:52:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c73", 0x81) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 693.657273][T14661] loop2: detected capacity change from 0 to 208 11:52:06 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r0, &(0x7f0000001200)=[{&(0x7f0000000080)="580000001400add427323b472545b4560a117fffffff81004e220e227f000001925aa80020007b00090080007f000001e809000000ff0000f03ac71000400000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) [ 693.802559][T14667] loop3: detected capacity change from 0 to 61456 [ 693.832116][T14675] xt_CT: You must specify a L4 protocol and not use inversions on it 11:52:06 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c73", 0x81) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 693.862031][T14661] jfs_mount: diMount failed w/rc = -5 [ 693.880178][T14661] Mount JFS Failure: -5 [ 693.916671][T14661] jfs_mount failed w/return code = -5 11:52:07 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) fadvise64(r1, 0xffffffffffffffff, 0x740d, 0x4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x3, &(0x7f00000007c0)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0x2, 0x200, r1, 0x0, 0x0, 0x800, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x2, 0x0, 0x1}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000002480), 0x0, 0x0, 0x0, 0x0, r2}]) creat(0x0, 0x0) 11:52:07 executing program 0: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7770, 0x60, &(0x7f00000001c0), 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x8f, 0x0, 0x160, 0x160, 0x62020000, 0x260, 0x260, 0x160, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback=0x7f008e04, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0xb003, 0x130, 0x160, 0x8, {0xf400000000000000}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'kmp\x00', "4bc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x5a}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, 0x0, 0x0) 11:52:07 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c73", 0x81) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:52:07 executing program 1: r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) open(0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c0c0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0x7770, 0x0, &(0x7f00000001c0), 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) sendmsg$NL80211_CMD_RADAR_DETECT(r3, &(0x7f0000000540)={0xffffffffffffffff, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="0c009900040000003500000005001901060000000800270000000000080022017601000008009f00000000000800"], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x800) 11:52:07 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) 11:52:07 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/56, 0x38, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b", 0x96) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 695.204555][T14695] loop2: detected capacity change from 0 to 208 [ 695.243599][T14697] xt_CT: You must specify a L4 protocol and not use inversions on it [ 695.255600][ T3709] I/O error, dev loop2, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 11:52:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b", 0x96) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 695.322658][T14696] loop3: detected capacity change from 0 to 61456 [ 695.396136][T14695] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 695.396136][T14695] 11:52:08 executing program 0: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7770, 0x60, &(0x7f00000001c0), 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x8f, 0x0, 0x160, 0x160, 0x62020000, 0x260, 0x260, 0x160, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback=0x7f008e04, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0xb003, 0x130, 0x160, 0x8, {0xf400000000000000}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'kmp\x00', "4bc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x5a}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, 0x0, 0x0) [ 695.506827][T14695] ERROR: (device loop2): remounting filesystem as read-only 11:52:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b", 0x96) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:52:08 executing program 1: r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) open(0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c0c0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0x7770, 0x0, &(0x7f00000001c0), 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) sendmsg$NL80211_CMD_RADAR_DETECT(r3, &(0x7f0000000540)={0xffffffffffffffff, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="0c009900040000003500000005001901060000000800270000000000080022017601000008009f00000000000800"], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x800) [ 695.556477][T14695] xtLookup: xtSearch returned -5 [ 695.564991][T14695] read_mapping_page failed! [ 695.646366][T14695] jfs_mount: dbMount failed w/rc = -5 [ 695.679851][T14695] Mount JFS Failure: -5 11:52:08 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08", 0xa1) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 695.740216][T14695] jfs_mount failed w/return code = -5 [ 695.798668][T14696] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 695.798668][T14696] [ 695.856146][T14712] xt_CT: You must specify a L4 protocol and not use inversions on it [ 695.913710][T14696] ERROR: (device loop3): remounting filesystem as read-only [ 695.944563][T14696] xtLookup: xtSearch returned -5 [ 695.985480][T14696] read_mapping_page failed! [ 696.366784][T14696] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 696.399970][T14696] Mount JFS Failure: -5 [ 696.411099][T14696] jfs_mount failed w/return code = -5 11:52:09 executing program 4: r0 = getpgid(0x0) perf_event_open(&(0x7f0000000700)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x2}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = open(&(0x7f0000000140)='./bus\x00', 0x141042, 0x0) write$UHID_INPUT(r1, &(0x7f0000001440), 0xfffffc41) fadvise64(r1, 0xffffffffffffffff, 0x740d, 0x4) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='fd/3\x00') io_submit(0x0, 0x3, &(0x7f00000007c0)=[&(0x7f0000000580)={0x0, 0x0, 0x0, 0x2, 0x200, r1, 0x0, 0x0, 0x800, 0x0, 0x1}, &(0x7f00000006c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, &(0x7f00000005c0), 0x0, 0x2, 0x0, 0x1}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000002480), 0x0, 0x0, 0x0, 0x0, r2}]) creat(0x0, 0x0) 11:52:09 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, 0x0, 0x0) 11:52:09 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08", 0xa1) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:52:09 executing program 0: syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) sendto$inet(r0, 0x0, 0x0, 0x400c0c0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r0, &(0x7f0000000080), 0x7770, 0x60, &(0x7f00000001c0), 0x10) r1 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r1, 0x4000000000000, 0x40, &(0x7f0000000180)=@raw={'raw\x00', 0x2, 0x3, 0x2f8, 0x8f, 0x0, 0x160, 0x160, 0x62020000, 0x260, 0x260, 0x160, 0x260, 0x260, 0x3, 0x0, {[{{@ip={@loopback=0x7f008e04, @local, 0x0, 0x0, 'vlan0\x00', 'bridge_slave_0\x00'}, 0xb003, 0x130, 0x160, 0x8, {0xf400000000000000}, [@common=@unspec=@string={{0xc0}, {0x0, 0x0, 'kmp\x00', "4bc74c01d6369df17d17ac76fa5f9b3bfa0c34430d864040bc25b2b73a59aa2acab6b1d2cc05060feb70b5bc8c2d4ba3a94a2d2393e3182f64695d7d05fb478c8f56627a5cf905d564eeeb83ff0150ca0f3c44f7fda4d20a55050342ea9685ecc8838e049f1f2e2d081ddda375bb7008adc297a5ece1bb2df53d17bef26bb6f8", 0x5a}}]}, @common=@unspec=@CONNMARK={0x30}}, {{@uncond, 0x0, 0x98, 0x100, 0x0, {}, [@common=@ttl={{0x28}}]}, @unspec=@CT2={0x68, 'CT\x00', 0x2, {0x0, 0x0, 0x0, 0x0, 'pptp\x00', 'syz1\x00'}}}], {{'\x00', 0x0, 0x70, 0x98}, {0x28, '\x00', 0x4}}}}, 0x358) sendmsg$NL80211_CMD_RADAR_DETECT(0xffffffffffffffff, 0x0, 0x0) 11:52:09 executing program 1: r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) open(0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c0c0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0x7770, 0x0, &(0x7f00000001c0), 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) sendmsg$NL80211_CMD_RADAR_DETECT(r3, &(0x7f0000000540)={0xffffffffffffffff, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="0c009900040000003500000005001901060000000800270000000000080022017601000008009f00000000000800"], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x800) 11:52:09 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/56, 0x38, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08", 0xa1) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 697.233910][T14726] loop2: detected capacity change from 0 to 208 [ 697.298175][T14728] xt_CT: You must specify a L4 protocol and not use inversions on it [ 697.320956][T14723] loop3: detected capacity change from 0 to 61456 11:52:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f907", 0xa6) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:52:10 executing program 1: r0 = syz_open_procfs(0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x51c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet(0x2, 0x6000000000000003, 0x4) setsockopt$SO_BINDTODEVICE(r1, 0x1, 0x19, &(0x7f0000000040)='sit0\x00', 0x10) open(0x0, 0x0, 0x0) sendto$inet(r1, 0x0, 0x0, 0x400c0c0, &(0x7f0000000000)={0x2, 0x0, @multicast2}, 0x10) sendto$inet(r1, &(0x7f0000000080), 0x7770, 0x0, &(0x7f00000001c0), 0x10) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$IPT_SO_SET_REPLACE(r2, 0x4000000000000, 0x40, 0x0, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) getsockopt$sock_cred(r3, 0x1, 0x11, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), r0) sendmsg$NL80211_CMD_RADAR_DETECT(r3, &(0x7f0000000540)={0xffffffffffffffff, 0x0, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="0c009900040000003500000005001901060000000800270000000000080022017601000008009f00000000000800"], 0x50}, 0x1, 0x0, 0x0, 0x40}, 0x800) [ 697.581738][T14726] read_mapping_page failed! 11:52:10 executing program 0: ioprio_set$uid(0x3, 0x0, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) [ 697.688504][T14726] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 697.693485][T14723] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 697.693485][T14723] 11:52:10 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f907", 0xa6) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 697.786815][T14726] Mount JFS Failure: -5 [ 697.791175][T14726] jfs_mount failed w/return code = -5 [ 697.791966][T14723] ERROR: (device loop3): remounting filesystem as read-only [ 697.846042][T14723] xtLookup: xtSearch returned -5 [ 697.876396][T14723] read_mapping_page failed! 11:52:10 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, 0x0, 0x0) [ 697.962903][T14723] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 698.031572][T14723] Mount JFS Failure: -5 [ 698.051280][T14723] jfs_mount failed w/return code = -5 [ 698.359807][T14749] loop2: detected capacity change from 0 to 208 [ 698.719309][T14749] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 698.719309][T14749] [ 698.761922][T14749] ERROR: (device loop2): remounting filesystem as read-only [ 698.826542][T14749] xtLookup: xtSearch returned -5 [ 698.832503][T14749] read_mapping_page failed! [ 698.869815][T14749] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 698.905326][T14749] Mount JFS Failure: -5 [ 698.957014][T14749] jfs_mount failed w/return code = -5 11:52:12 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, 0x0, 0x0) 11:52:12 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f907", 0xa6) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:52:12 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000040)={0x0, @in, 0x0, 0x0, 0x80}, 0x98) 11:52:12 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) connect$inet(r2, &(0x7f0000000000)={0x10, 0x2}, 0x10) 11:52:12 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/56, 0x38, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:12 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000011c0)={&(0x7f0000000000)=@in={0x10, 0x2}, 0x10, 0x0, 0x0, &(0x7f0000000040)=ANY=[], 0x1c}, 0x0) 11:52:12 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd10", 0xa9) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 699.313606][ T26] audit: type=1400 audit(1639309932.230:302): avc: denied { connect } for pid=14753 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 11:52:12 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) setsockopt$sock_int(r0, 0xffff, 0x100, &(0x7f0000000040), 0x4) [ 699.471126][T14755] loop3: detected capacity change from 0 to 61456 [ 699.491748][ T26] audit: type=1400 audit(1639309932.230:303): avc: denied { setopt } for pid=14751 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 11:52:12 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd10", 0xa9) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 699.578884][T14762] loop2: detected capacity change from 0 to 208 11:52:12 executing program 1: r0 = socket(0x2, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x8000}, 0x8) [ 699.758562][T14755] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 699.758562][T14755] [ 699.835933][ T26] audit: type=1400 audit(1639309932.750:304): avc: denied { write } for pid=14770 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 [ 699.855365][T14755] ERROR: (device loop3): remounting filesystem as read-only 11:52:12 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd10", 0xa9) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 699.902349][T14755] xtLookup: xtSearch returned -5 11:52:12 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000000)=ANY=[@ANYBLOB="0a012e2766"], 0xa) [ 699.933203][T14755] read_mapping_page failed! [ 700.009311][T14755] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 700.018228][T14762] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 700.018228][T14762] [ 700.070020][T14755] Mount JFS Failure: -5 [ 700.074724][T14755] jfs_mount failed w/return code = -5 [ 700.100756][T14762] ERROR: (device loop2): remounting filesystem as read-only [ 700.138717][T14762] xtLookup: xtSearch returned -5 [ 700.187071][T14762] read_mapping_page failed! [ 700.239426][T14762] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 700.256471][T14762] Mount JFS Failure: -5 [ 700.260968][T14762] jfs_mount failed w/return code = -5 11:52:13 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[], 0x0) 11:52:13 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r1, 0x84, 0x7, &(0x7f0000000000), &(0x7f00000000c0)=0x88) 11:52:13 executing program 4: semget(0x2, 0x61ffc0b209cdcb7d, 0x60c) 11:52:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c", 0xaa) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:52:13 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/60, 0x3c, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:13 executing program 0: shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ffc000/0x4000)=nil, 0x0) 11:52:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c", 0xaa) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:52:13 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) bind(r0, &(0x7f00000001c0)=@in6={0x1c, 0x1c, 0x2}, 0x1c) listen(r0, 0x0) 11:52:13 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) setsockopt$inet6_int(r0, 0x29, 0x16, &(0x7f00000002c0), 0x4) [ 700.405515][ T26] audit: type=1400 audit(1639309933.320:305): avc: denied { getopt } for pid=14783 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=sctp_socket permissive=1 11:52:13 executing program 0: r0 = socket(0x2, 0x5, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 11:52:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c", 0xaa) vmsplice(r1, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 700.594854][T14787] loop3: detected capacity change from 0 to 61456 [ 700.754865][T14798] loop2: detected capacity change from 0 to 208 11:52:13 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 700.807719][T14787] read_mapping_page failed! [ 700.812912][T14787] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 700.829088][T14787] Mount JFS Failure: -5 [ 700.834264][T14787] jfs_mount failed w/return code = -5 [ 701.135991][T14798] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 701.135991][T14798] [ 701.151389][T14798] ERROR: (device loop2): remounting filesystem as read-only [ 701.184660][T14798] xtLookup: xtSearch returned -5 [ 701.193879][T14798] read_mapping_page failed! [ 701.199856][T14798] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 701.268184][T14798] Mount JFS Failure: -5 [ 701.278037][T14798] jfs_mount failed w/return code = -5 11:52:14 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[], 0x0) 11:52:14 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) connect$inet(r0, &(0x7f0000000000)={0x10, 0x2}, 0x10) 11:52:14 executing program 0: r0 = socket(0x2, 0x5, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 11:52:14 executing program 1: r0 = socket(0x2, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000001c0), 0x98) 11:52:14 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/60, 0x3c, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 701.458662][T14819] loop3: detected capacity change from 0 to 61456 11:52:14 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f00000025c0)=ANY=[@ANYBLOB="10000000000000000000000000000000e000000000000000010000000100000081b2036cf53bcfb4b33dcfcf723ff369027b37ca87cc13bf1fc9fb7049f28f116f801ae0ddc15c3e48e193f560509d23f0aaa77df57589ff84588ea9de0a9c13d07825c06de4a0f5cc9bb53f8b7f7a92d925531a8e3e273be489a222d936f5b0870385e664615a450a7e7c47a01839474bd6dc58b2472c42afe0e6497b78d9db32a306471ff77919dac75bcba46b451a685bf25f0d4b32757b48f9845af8457ebc3e29f85191f420606618984881b0c97c830761667ed12cb10bb244fdf1e79acea6182f84ebb703761c8e00b4f6d49bdfb2"], 0x300}, 0x0) 11:52:14 executing program 0: r0 = socket(0x2, 0x5, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 11:52:14 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000040)={r4}, &(0x7f0000000080)=0x8) 11:52:14 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) 11:52:15 executing program 0: r0 = socket(0x2, 0x5, 0x0) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={0x10, 0x2}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000000100)={0x10, 0x2}, 0x10) 11:52:15 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/60, 0x3c, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:15 executing program 4: r0 = socket(0x2, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f00000000c0)={0x0, @in, 0x0, 0x0, 0x208, 0x0, 0x6}, 0x98) [ 702.190874][T14828] loop2: detected capacity change from 0 to 208 [ 702.532807][T14843] loop3: detected capacity change from 0 to 61456 [ 702.576512][T14828] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 702.576512][T14828] [ 702.638898][T14828] ERROR: (device loop2): remounting filesystem as read-only [ 702.661429][T14828] xtLookup: xtSearch returned -5 [ 702.685458][T14828] read_mapping_page failed! [ 702.693887][T14828] jfs_mount: dbMount failed w/rc = -5 [ 702.745015][T14828] Mount JFS Failure: -5 [ 702.760595][T14828] jfs_mount failed w/return code = -5 11:52:15 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[], 0x0) 11:52:15 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000480)="f0", 0x1}], 0x1}, 0x0) 11:52:15 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000040)={0x1c, 0x1c, 0x1}, 0x1c) r1 = fcntl$dupfd(r0, 0x0, r0) connect$inet6(r1, &(0x7f0000000080)={0x1c, 0x1c, 0x1}, 0x1c) 11:52:15 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000100)='cubic\x00', 0x4) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0x40, &(0x7f0000000240)='htcp\x00', 0x5) 11:52:15 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r1, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(0xffffffffffffffff, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) [ 702.886113][T14843] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 702.886113][T14843] 11:52:15 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_ASSOCINFO(r0, 0x84, 0x2, &(0x7f0000000000), &(0x7f00000000c0)=0x14) [ 702.986313][T14843] ERROR: (device loop3): remounting filesystem as read-only [ 703.020936][T14843] xtLookup: xtSearch returned -5 [ 703.031708][T14843] read_mapping_page failed! [ 703.065826][T14843] jfs_mount: diMount(ipaimap2) failed, rc = -5 11:52:16 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000011c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f00000004c0)=ANY=[@ANYBLOB="1c"], 0x1c}, 0x0) [ 703.138814][T14843] Mount JFS Failure: -5 [ 703.149017][T14843] jfs_mount failed w/return code = -5 [ 703.199359][T14857] loop2: detected capacity change from 0 to 208 11:52:16 executing program 4: r0 = socket(0x1c, 0x5, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:52:16 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) r1 = dup2(r0, r0) sendto$unix(r1, 0x0, 0x0, 0x0, &(0x7f0000001a00)=ANY=[], 0xa) 11:52:16 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/62, 0x3e, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:16 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_int(r0, 0x0, 0x5, &(0x7f00000000c0), 0x4) 11:52:16 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_PRIMARY_ADDR(r0, 0x84, 0x7, &(0x7f0000000040), &(0x7f0000000100)=0x88) [ 703.706784][T14857] jfs_mount: diMount failed w/rc = -5 [ 703.768265][T14875] loop3: detected capacity change from 0 to 61456 [ 703.791017][T14857] Mount JFS Failure: -5 [ 703.844242][T14857] jfs_mount failed w/return code = -5 11:52:17 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) 11:52:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = dup2(r0, r0) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r1, 0x84, 0x103, &(0x7f0000000bc0)={0x0, 0x2, "19d7"}, &(0x7f0000000000)=0xa) 11:52:17 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0}, 0x0) shutdown(r0, 0x0) 11:52:17 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, 0x0, 0x0, 0x0) 11:52:17 executing program 4: r0 = socket$inet6_icmp_raw(0x1c, 0x3, 0x3a) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f00000000c0)={@loopback}, 0x14) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x2e, &(0x7f0000000240)={@empty}, 0x14) 11:52:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000011c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000001180)=[@prinfo={0x14}], 0x14}, 0x0) 11:52:17 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000000)={0x1c, 0x1c, 0x1}, 0x1c) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000040)={0x1c, 0x1c, 0x2}, 0x1c) 11:52:17 executing program 0: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, &(0x7f0000000040)=[{&(0x7f0000000480)="f0", 0x1}], 0x1}, 0x0) sendmsg(r0, &(0x7f0000000800)={0x0, 0x0, &(0x7f00000007c0)=[{&(0x7f0000001300)="4b6037390b254810679b148f16e4799f945525e328964422314c39c0937e4df94de7347317a754120c99fbcc49e9e440988cb7a90547817a304811c979d6b0996c12b8edae50dc55e9967dfe3a2d8588e76fc786f50eb5f1ccf727f2d5c33bb3fde76db05cc9d49e8c7c3af3394be38440e7f8aaaef8802a47db9a8ac216a663c342bd19afe31c077ca08b8eecc28a7b65e91d95c222df749a78a79d8ffd92c2bc4bb15fb4bcdbcbbaa93754718dc00a62cfa5336b8116c3af7a068420f381bec1d3f644997b47cd2feed75fec2676717a8e468b01f1c802b5a51fff28b8d915bf62a3be62b8391c53b1bdf198f24e84ffa68aa869cd95f951686921ea704b56676f66f4a26326509f5d6bf355bbd7c02e84c5520784f413cfd25f18126d65a1a68b860dffc799d2b49ce5856468fa381cd7e4476dacf2cd6593de59cb1d8e15aef65cd80ce962c22f4d81b8fa9ec0df35a0e5ce735f10e75dab39384c0c00ffd59995ba629db52173d9d1743409488ff9675a54a48597ae5b78af589969e432dc012916af1c22f8502e796c792e06cd82439e7564765c050a4820dd133f703a4fa5bc220a29e7ed6838f60cd9beb38ddbcdd95706b94f3d57586dc01dc7af72fb896d77c49540d0a906c0e92eb8217e5cf1d1f0f3cf7d86a6ccfcfbca71a73a0c667d93723a3fd1f5f7e32d223f8a69acc8078facc0fda8f3934a7a93945af3cc3f0743e70c2dc0c8d97c7e4b25277475b5036918f538cb3713016cebeba5500df5755e30d41a62b153c954d459bad2f46ac5d1fda416290f3f6e744ce51e59ff6ee0e08ea0e1a7d9c3f02a37e1d50ce15ae7df66668c627bed0b0b12209b0c3f6cd9f1f3bb6f7782723a501dc6ab9554fa7cbe51a6bfe66dac9a64f3820396772dda71fbf998a4475745f8427ea97dbe93aa2f5d3196534161f8f3432ac873df3a304cc641cc469b88465a0a99c857a9172cb131bf1ab3e4902bcccf1471b175497d3520db58dcb9924ba60c014cf059f3331b7045c087ab43908200d51ce4c01a0b81d310d7f927315ae8be55ec0c2329fc3fb551aed94a9d95722ab50146b55d27bc4c878bb8512be7bc07549ebdc2727373c4fed0dd3ace5d9d72cde4e9476bf99de55fc268b90f73ed93615c20df5381764ff8d6d008d153f20dae6f79349728288a36c16adbcd3006679a691d008a1749ad239a320f42e4da9a83373c7c484f8a428db62bc0e6e161c6eae0c99105bfe075e8cf3f4ae28a4dbe83675220db087c85eb7974835231feccedba1f6d5b75481eeec6fd3726b01016d09458731a6cb718bff3c6a1c21af2910309fd13c508a4abd62829f1d5c093660b989df13fd28e4ee6e18d8db6055fd518a46b18cf9d22bbb889b45568eae50ff03328f18309e337933d10b524b00ab106a29e285e906ff83015e141480f6e282e8f3bb2e04c06699d3e161140a96e30de42dd138eb42e769bc4e310beec0583b7c699462fea370804ce79e3fab88c55934b40db195ced6d62e66934b50b3e5e3a9c69865de6f3b08ecaccc7ebfe763197181b413c27d4e987dfb5fd2547c49ac18d365d07cdff56dbe3620b8cc13000c2f7adf27fb267807b58ee3fc152cc4c6c3bedbf0663efb4904b809314375fa679555bbce6ad05219b1489b3f1c77ee4ea46ba8e4e3c03e8ff959fc12850e7f1ebdd75b35bf9d21da5226eb4adce2d122c10486aedb7fc601b4dab9c2b26de5912a1ec986dfd23350ecd4f3a281af8e1d8af1b99f241981b535cd10b9a612c64b96df1bb9cb26714cee67e72ad17f3347a7a82d959ab56b0c476b06a88a21a07f1863853de917dc6835123a73c0c7982a28fb72691c4d509ce777d755c65f807d0a8208d794b5a7cc88c79bd737db86172780c5be69a2ffd445b0d9a8e9ec9934b47c093839d9c455f6714695c5e282b33ddcd7969f8735c754031e0e5e14f18397e4fa8d07b92fd26b81d30692933fde5ac3f18eb1d97c742e311fdb2aee52ea98c1a40417db3e78b605351e606440e16f38af3e50f383ce205f056e4f82f194d084744a697e9268331a5e2a603eb6a292859be02e63c5fd4d0e255950e9417f3f6a24e29cd2de42f5b978d2678e461c064c2c8a0ea830faf8250a26c27e7e59cf81d770e3b5f87e15194f8bcaa77fdf811e10c2853cb26089588418da0a9f73d788d48e1fd572cd9ee68852a1b09269f8f7778256de063a811dfd9ac9ce192260ea887c3b37f8d9383cce6604274e83af899a3965d83edbad9429e6e7e2fbe0411a06beb56936012269d56aafcc7f82287f9a0df8906398476795412cb8e076d10f15c2d976f0e215851efcdeb6507dfd3c57f92088397cb9f9b18e9f67fc74825875874d98bfaadab17c709f10d20cb13137727352e42b157283f505d38dc263135c61abaf8c01c9703159ea892f1a683664e12a5edc50ae53d31a3d604ae62d61ad9716966b8b7c20fa3a7625a0153e1b5a8b11982bd2fb0eeabc5861f5eb61c20a975a60c1f233836426aea0bd12c57876bb312245e1c8112bd48a49b63da6ec43d05fa7170497749350fbab3d60886e37affdd5d7279848a93ab09741bc78c27e57648a2ef30f74b07f4a47eba4142a79ac85cced3ea658f67488ca62d552cb43656fe7251d4394bf0b662b2a93987eafa16410758d7c39025f8c403b87e5bdad7325c50898aa81db6618c4e31962536822103a13e869fceae55c5f235af00613ecaed854c23455d0f95a158f13f55806ef3a4d6cf56bb46a666d28459678ba69614c37a8daac5c1859d78886bbaf4aa9ebf8d166d004d78e9f7edc1cc6ff62b36caa4a2137d2716a75ad7d3e95aa1ee06f70931a99bc9c0c2528d90048d6d22f72664000d1d8302d5b20a943551400f06b8ade3ee25148f1a3a990358da739c2d029d39a790c163b8c1340fc58b332dc623425a45412bccde43a4d2a6ccaad50c482cc28dce1112b10c906a34808a54c8cff9585171819ab72edb891bb25ebab6d628e3b0247f5d4b11bf899f3f3738dc8921247ae75c7ad8905f5af021c7cfcbf76d6de0473f49bb4002eaa348f5d4ff4412c0f89b6982c953431e74403eadfa36a19034c153852ef0c9ad2d2e49a4f89c4dda3f2565e3cb8dc5605d03e0c06bc48605e9f5f311f1a32dcaa7e0612c85201bfdff03231ad4502c7ff67bab50d8362e9c38c6513d45d45cf5a1a03476be3f4d3b6eb31940ff9dd99e1c0fe2fa63df8203de55b390c9b460ae5b17a1e5492c54a6b26546c25232eae6bb66860629c0b06dff8628292dc3cd8aaadb40c2aed2f062438ccdf2078ec6e2719ba50d9e3089fa120751cf74409ea5258882538625cbe9f13dbcbdd7382bee2051a133ca6fdb197b8aa8c304a239adb6723ac96ec9fa870031363ca5efad22640d03743ed7fa926ef130918a93433562770441cea955e0e764d2d2f5c4b51eb22f6fda4a48e702f0efe670766dd1fd60b7e7d9755704747b9a50bacebb97f70359e27ffaf60e9fae7971559a2d406e99e4eddad6adcbdedcac86190ab5a7e64903bb395ee271a487a721da7c609e5e161cb22d72dbd76c23d794ff920ac792a4a2017341abc49a5eb41028d6a1f6cbde719050ee08b6515a9a9c5af69c38b916e7bd38fa0da6e2517826cb5fcabb56a0b01125c6b7d71e6e4dff12211b8499faa107778c527504e06ba2754dde62af3c138aab04a8613396dbc8142102d1a33393aa7979eb26d907743f926fe1cd60406160a7eb7853ca3e9019c2fd9da69288290f67cc0b02a117c195effedafe72ae983aca98813140d39abe0fd52f65ea020d4c118afa6be3aef97683de852eea9e3c8438aa43a0397472899e9f52f7edb0be719eaf9e3bb598faf79ccc8d4536363b92be091b1b88870bf44ae6f988309060b3b9d2431bab251bf5415a0da04b2e3ed7bb7e71a26940f129ea2dbf7f139e55c9ad64136c0b2e765dc2f05bb8f5c0ed46f9108f8504bfc498dcb69b0153cfbe31fc15740d9f474eab8dfd2467e09977134359150aa5e67493fa1b8c4ab1d14b00ea5bf4530fe5bf8a44e67e1026392f18c6b6da8ee3b7f9aca213267c7ebf1e0eee8a86ac4088496c92c882b02dbad578f4a5ce92d83e4d3791c45ac789c7c6688a679ce6535167ba4685ca28506dc8ebbd3abc6e462de5b49c7ec4bc700e53a5d9fb227b43482469335074d58b728460d33755e45d206bb64dbc0a744f3b3f6f4ea8865d1cc31c358e40d800ae60ea88df67aa253be7cf379d8c79b0a9443aafd09504ad897ab79d7edd2a2feaa895a2816328230210f7eeeb06102b537a9e192104657393592662a058ffbddfca862f3f056887e8a67f312b7e8753bc4fa26c40ef1e2f347d311a320af6099a37bd9907a9e153ea4cce67b643a50bb0e354b07226caba924d074e0f5bbaea61cd847973c6326177e67abe1c4fae10b4c83aa259717b74ec98c822824309f25bef4f6ffcf641d806da24a3632e013bc714780d73014cb1e3506519965c7fb06739d9eb2e413ebb54a05079db620a6422f275407810afc14fb2d05a017be074f88498ffa9815d55121f10388b352117081e1dfedabe5e2eecd160fd262f896ab4b19be65bc7fb509bacddde322be76a88d76f5254eb6a4b3cfd7cbf36778bec5e417f054851c744812339c773ad431432f7f4a72c7ccf0bd2fc867bcd7035fac98fffd7c365a59ee705e2c501f350ec6e9d3c24dfdd411e20e29d1bfdb9c3be8af7e161755b0aa7b640717b002c92279afbeb776c4ac48d79054210c2c3e3f03aefba102fe3c933fa8477f27ccfdacd88b79732dd86323e8fee443dae7708a3d1a20e34b3e8f77f34b130a5d91d445dc11a204b847104e01f5486b1a18796e1d43e28bc66880cf29758e3603423a63182b33ac34623954ea0142a95605972309e510a3bf7529e9379495e736d28f75e3317928689302d9dde5b8ca3010de64ed2dd9711a3a951366d3908f1c281f613327b19254ef7ad4ea203662463fd5437d851c32c8c115ab07921b2193dfa33fbfab2e758016acd0b8ca58d6c17e782cf87b758c7de82602c2c3db3d438d7e5843509ff4d7f49c2c162033b7006daf3fe4c59251c8c89027d05f01a3aa777696c03c5a7b2f77a0993226eddf0592a5b7dcf2f9d6cda956ec79d71f32d16d2ee376bd908db1494575d8c21e6174b7b8cb9980ee7d638460d1be40f1f6fbb36cbc4f2740f4e23d1172cfd65cb62b0d027df947eb428f466c4ee2dedbc3cf5479347c529ef9ae331439f3f9fa7f3bbee0d08ff072cad8978850c341ad246e50e6a27f9d9f463ad72c68b2b426be0b6761a534d83868e7ccb08337802ffefd10249ad634beb0b13f05a3587d2529f4d42315e4c0b6648678db301eef27c42866d62762a4e913c3d3bd2a9624a7bb4941d6f2c7f92b190d95ec0e02a9dde19a238ff8beea4b532863cb14dfe8c3bd904c2429935d1ef5b157b9a5d6e40e26e9ced457bd6bcab7a08f6d53e7a82af50b13364c8ae82caef04bebe8ab75b35509e9c3f8e75c4d6cae9a9a140c324edc09e4bcdb8c66ab0cb40b9333f636fe6e80b9c68fa57d533c6b379642efd812a1d287ef555bbd3d585aa2d79ce6c6ee0cc8e42f8c1db80f52173b8f33ef46ffd7e00d838cd367f391e7eac643d23b69223c296bc96c096390a33bcb715fb785881beedb13bc9070da74ca5f2fa3c5be745fefbd3dc6d6ece0bff81ab2788feb4a17768e41dec8b07529420e2f18d6b3287c3f474b41286cfad6bfc", 0xff1}], 0x1, &(0x7f0000000b00)=[{0x10}, {0x10}], 0x20}, 0x0) 11:52:17 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x5, 0x84) connect$inet6(r0, &(0x7f0000000100)={0x1c, 0x1c, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000080)={0x1c, 0x1c, 0x2}, 0x1c) 11:52:17 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/62, 0x3e, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 704.681899][T14899] loop2: detected capacity change from 0 to 208 [ 704.782105][T14899] jfs_mount: diMount failed w/rc = -5 [ 704.799722][T14899] Mount JFS Failure: -5 [ 704.842496][T14899] jfs_mount failed w/return code = -5 11:52:17 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0), 0x90) 11:52:17 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, 0x0, 0x0, 0x0) 11:52:17 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) 11:52:17 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xe, &(0x7f0000000140), &(0x7f0000000180)=0x8) 11:52:18 executing program 4: open(&(0x7f0000000100)='\x00', 0xaa873841e2539d83, 0x0) 11:52:18 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0xff, 0x3}, 0x10) 11:52:18 executing program 1: r0 = socket(0x2, 0x10000001, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001440)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000380), &(0x7f0000000440)=0x98) 11:52:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x29, &(0x7f0000000240), 0x8) 11:52:18 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000005c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="0a01bf01ad78a25b7197"], 0xa) [ 705.351653][T14920] loop3: detected capacity change from 0 to 61456 [ 705.400271][T14930] loop2: detected capacity change from 0 to 208 11:52:18 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendmsg(r0, &(0x7f0000000140)={&(0x7f0000000000)=@in6={0x1c, 0x1c}, 0x1c, 0x0, 0x0, &(0x7f00000025c0)=ANY=[@ANYBLOB="10"], 0x300}, 0x0) [ 705.636501][T14930] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 705.636501][T14930] 11:52:18 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r1, &(0x7f00000001c0)={0x10, 0x2}, 0x10) r2 = socket$inet6_sctp(0x1c, 0x1, 0x84) r3 = dup2(r1, r2) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r3, 0x84, 0x105, &(0x7f0000000140)={0x1, [0x0]}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(r0, 0x84, 0x15, &(0x7f0000000040)={r4}, &(0x7f0000000080)=0x8) [ 705.826309][T14930] ERROR: (device loop2): remounting filesystem as read-only [ 705.896879][T14930] xtLookup: xtSearch returned -5 [ 705.951949][T14920] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 705.951949][T14920] [ 705.954016][T14930] read_mapping_page failed! [ 705.970238][T14930] jfs_mount: dbMount failed w/rc = -5 [ 705.976010][T14930] Mount JFS Failure: -5 [ 706.000904][T14930] jfs_mount failed w/return code = -5 [ 706.037037][T14920] ERROR: (device loop3): remounting filesystem as read-only [ 706.086384][T14920] xtLookup: xtSearch returned -5 [ 706.106410][T14920] read_mapping_page failed! [ 706.111435][T14920] jfs_mount: diMount failed w/rc = -5 [ 706.122923][T14920] Mount JFS Failure: -5 [ 706.134207][T14920] jfs_mount failed w/return code = -5 11:52:19 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, 0x0, 0x0, 0x0) 11:52:19 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_mreqn(r0, 0x0, 0xc, &(0x7f00000001c0)={@multicast2, @broadcast}, 0xc) 11:52:19 executing program 1: r0 = socket(0x2, 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs={0xffffffffffffff03}, 0x8) 11:52:19 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB], 0x0) 11:52:19 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/62, 0x3e, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:19 executing program 4: mprotect(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x6) 11:52:19 executing program 0: r0 = socket(0x2, 0x10000001, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001440)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) setsockopt$inet_sctp_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0xa, &(0x7f0000000080)={0x0, @in, 0x0, 0x0, 0x0, 0x0, 0x3ff}, 0x98) 11:52:19 executing program 1: sendmsg$unix(0xffffffffffffffff, &(0x7f0000001740)={0x0, 0x0, &(0x7f0000000500), 0x100000000000036c, 0x0, 0x208}, 0x0) 11:52:19 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0), 0x90) 11:52:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000002740)=[@sndinfo={0x1c}], 0x1c}, 0x0) [ 706.472651][T14953] loop2: detected capacity change from 0 to 208 11:52:19 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) sendmsg$inet_sctp(r0, &(0x7f00000011c0)={&(0x7f0000000000)=@in6={0x1c, 0x1c, 0x3}, 0x1c, 0x0, 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='['], 0x14}, 0x0) 11:52:19 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r0, 0x84, 0x101, &(0x7f00000002c0), &(0x7f0000000080)=0x98) [ 707.064467][T14965] loop3: detected capacity change from 0 to 61456 [ 707.077410][T14953] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 707.077410][T14953] 11:52:20 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) 11:52:20 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0), 0x90) 11:52:20 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001900)={0x1c, 0x1c, 0x3}, 0x1c) [ 707.249775][T14953] ERROR: (device loop2): remounting filesystem as read-only [ 707.268030][T14965] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 707.268030][T14965] [ 707.268948][T14953] xtLookup: xtSearch returned -5 [ 707.340887][T14965] ERROR: (device loop3): remounting filesystem as read-only [ 707.349454][T14953] read_mapping_page failed! [ 707.369913][T14965] xtLookup: xtSearch returned -5 [ 707.375584][T14965] read_mapping_page failed! [ 707.380633][T14953] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 707.403934][T14953] Mount JFS Failure: -5 [ 707.405629][T14965] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 707.435265][T14965] Mount JFS Failure: -5 [ 707.437503][T14953] jfs_mount failed w/return code = -5 11:52:20 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f5"], 0x0) [ 707.456550][T14965] jfs_mount failed w/return code = -5 11:52:20 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:20 executing program 0: mknodat(0xffffffffffffff9c, &(0x7f0000000140)='./file1\x00', 0x1000, 0x0) 11:52:20 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f0000000080)={0xc, 0x2}, 0x10) 11:52:20 executing program 1: r0 = socket$inet_sctp(0x2, 0x5, 0x84) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) r2 = dup2(r0, r1) getsockopt$inet_sctp_SCTP_GET_ASSOC_ID_LIST(r2, 0x84, 0x105, &(0x7f00000017c0), &(0x7f00000000c0)=0x4) 11:52:20 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f0000000040), 0x90) 11:52:20 executing program 4: r0 = socket$inet_sctp(0x2, 0x1, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) sendmsg$inet_sctp(r0, &(0x7f0000001640)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001a40)=[@init={0x14}, @sndinfo={0x1c}], 0x30}, 0x101) [ 707.852207][T14992] loop2: detected capacity change from 0 to 208 11:52:20 executing program 1: r0 = socket(0x2, 0x10000001, 0x0) r1 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r1, 0x0, 0x0, 0x0, &(0x7f0000001900)={0x1c, 0x1c, 0x3}, 0x1c) dup2(r0, r1) [ 708.029012][T14992] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 708.029012][T14992] 11:52:21 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) [ 708.223802][T14992] ERROR: (device loop2): remounting filesystem as read-only [ 708.228526][T14994] loop3: detected capacity change from 0 to 61456 [ 708.267204][T14992] xtLookup: xtSearch returned -5 [ 708.300710][T14992] read_mapping_page failed! [ 708.319871][T14992] jfs_mount: dbMount failed w/rc = -5 11:52:21 executing program 0: r0 = socket(0x2, 0x10000001, 0x84) read(r0, &(0x7f0000000200)=""/215, 0xd7) 11:52:21 executing program 4: r0 = socket$inet_sctp(0x2, 0x5, 0x84) connect$inet(r0, &(0x7f00000001c0)={0x10, 0x2}, 0x10) setsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(r0, 0x84, 0x23, &(0x7f00000000c0), 0x90) [ 708.377916][T14992] Mount JFS Failure: -5 [ 708.418978][T14992] jfs_mount failed w/return code = -5 11:52:21 executing program 1: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000001900)={0x1c, 0x1c, 0x3}, 0x1c) shutdown(r0, 0x0) 11:52:21 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f5"], 0x0) [ 708.491754][T14994] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 708.491754][T14994] [ 708.515223][T14994] ERROR: (device loop3): remounting filesystem as read-only [ 708.525107][T14994] xtLookup: xtSearch returned -5 [ 708.555715][T14994] read_mapping_page failed! [ 708.561518][T14994] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 708.573841][T14994] Mount JFS Failure: -5 [ 708.578871][T14994] jfs_mount failed w/return code = -5 11:52:21 executing program 0: r0 = socket$inet_sctp(0x2, 0x5, 0x84) setsockopt$inet_sctp_SCTP_RTOINFO(r0, 0x84, 0x1, &(0x7f0000000080)={0x0, 0x0, 0xff}, 0x10) 11:52:21 executing program 4: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) sendto$inet6(r0, &(0x7f0000000000)="a6", 0x1, 0x0, &(0x7f0000000080)={0x1c, 0x1c, 0x2}, 0x1c) 11:52:21 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:21 executing program 1: r0 = socket(0x1c, 0x5, 0x0) getsockname$unix(r0, 0x0, &(0x7f0000000000)=0xffffffffffffff7f) 11:52:22 executing program 0: r0 = socket(0x2, 0x10000001, 0x84) setsockopt$inet_sctp_SCTP_AUTH_KEY(r0, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x8000, 0x1, "bf"}, 0x9) sendmsg$inet_sctp(r0, &(0x7f0000001440)={&(0x7f0000000040)=@in={0x10, 0x2}, 0x10, 0x0}, 0x0) 11:52:22 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000), 0x0, 0x0) [ 709.164879][T15016] loop2: detected capacity change from 0 to 208 11:52:22 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000080)='/sys/class/power_supply', 0x0, 0x0) renameat(r0, &(0x7f0000000000)='./file0\x00', 0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00') [ 709.236813][T15021] loop3: detected capacity change from 0 to 61456 [ 709.478276][T15016] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 709.478276][T15016] 11:52:22 executing program 4: r0 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000000001f4, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="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", 0x1f2}], 0x0, &(0x7f00000001c0)=ANY=[]) fcntl$setstatus(r0, 0x4, 0x62400) [ 709.521819][T15016] ERROR: (device loop2): remounting filesystem as read-only [ 709.559906][T15016] xtLookup: xtSearch returned -5 [ 709.562911][T15021] read_mapping_page failed! 11:52:22 executing program 1: r0 = add_key$user(&(0x7f00000000c0), &(0x7f0000000100)={'syz', 0x3}, &(0x7f0000000140)="f6", 0x1, 0xfffffffffffffffb) keyctl$update(0x2, r0, &(0x7f0000000940)="a4", 0x1) 11:52:22 executing program 0: r0 = socket$inet6(0xa, 0x800000000000002, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x67, &(0x7f0000000100)=0x2e4, 0x4) setsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000000)='geneve0\x00', 0x10) connect$inet6(r0, &(0x7f0000004540)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg(r0, &(0x7f0000004d80)=[{{0x0, 0x300f401, &(0x7f0000001500)=[{&(0x7f0000000040)="d3622fe131479cee20fb607a9585dc0b411519fd3b65066522d73df58b9257b566c6fc626776defc3a2e249c910ccab00220bc31d41e44f96f67971b8ed8a3dc9eb4133a903d58da02dd1eca653150422bc91e9585fbf8", 0x57}, {&(0x7f00000011c0)="7cc3be44ec866303c11f9ec49c2fe80d4ccef580f3bf717b5e129f1dc7766fdf864b7bc35924f34bb5fd1dd89172a4b0db90eea51bdfec78bb53e8d41773cba7f1305a8a40b7368445a71ef7870273f1544930baf73a8bfa6ece09d54376b821b65fdf1e0704f1f3c5a823fa67f635159af010053f5b909f8e944c43d6fb1c4fca639b470d3e6ad140d0838958ecf0fc98a780205474fdeb93a97d27b4f3314a9585129aaec893d7fe36d87fd746841ac5c60b31e1732a1a3ca0afcc4068cdde63b142700c563c1ab59dc0b7200723bf21c694583ed8fed1b2bc5c204df3812c223ce0de2f40b69e7f4e8ba1c3ebc31de2f4190e3f1ceb", 0xf7}, {&(0x7f00000012c0), 0x80fe}, {&(0x7f0000000280)="0c22fcc306e8a4d628dc3f33cd1758b784d34ef62ecd943b96c5573b05e34886b55503a08eeac42aafc204e9fec654b4b0853f4c32d8d6f8968a96b81710a9ed49ae96ea22eb07accdc99ed31fb48b921b4c9af7278829eb32247169da3593e5e73371e82e3558cd87b9c876b91e091e933496ae3a6b5a00a79f50110980c83af2fd44e0f08908f806be4146080def894a3ac87c3d214e32b0e031c8873b6ed3cdb9c160ee236576cb5a749ee356d4f5df961b35ec3667bcfa641e2c812a5eefbd78546783b6bd280dc4ec1cd015bee7d07f0993d6", 0xd5}, {&(0x7f0000001440)="7b18908bcd34b2f4eef2193c5f89bb79551b5d7000ccc31628374b03e7f0b8bbfe45", 0x22}], 0x5, 0x0, 0x0, 0xffffffe0}, 0x1f00}], 0x400000000000132, 0x4000000) [ 709.581367][T15016] read_mapping_page failed! [ 709.614070][T15016] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 709.628445][T15016] Mount JFS Failure: -5 [ 709.633777][T15016] jfs_mount failed w/return code = -5 [ 709.645717][T15021] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 709.671653][T15040] loop4: detected capacity change from 0 to 264192 11:52:22 executing program 4: r0 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000000001f4, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="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", 0x1f2}], 0x0, &(0x7f00000001c0)=ANY=[]) fcntl$setstatus(r0, 0x4, 0x62400) [ 709.708513][ T26] audit: type=1400 audit(1639309942.630:306): avc: denied { mount } for pid=15039 comm="syz-executor.4" name="/" dev="loop4" ino=7 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 [ 709.718416][T15021] Mount JFS Failure: -5 [ 709.754932][T15021] jfs_mount failed w/return code = -5 [ 709.841075][ T26] audit: type=1400 audit(1639309942.710:307): avc: denied { unmount } for pid=3633 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 11:52:22 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f5"], 0x0) 11:52:22 executing program 4: r0 = syz_mount_image$squashfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x20000000000001f4, 0x1, &(0x7f0000000080)=[{&(0x7f0000010000)="6873717307000000911d675f004000000100000003000e00e0000200040000001201000000000000f801000000000000ac01000000000000e0010000000000007f000000000000001f0100000000000076010000000000009a010000000000001a73797a6b616c6c6572203a200020438c01200000009835a1e521433345949e001d0200ed0100000100911d675f40012b0100644c002a7d00032d6e001a040f000300ff277c005901006d08264c00000e2f746d702f73797a2d696d61676567656e3431393737363339322f66696c6530b5000129750102c40b7d00294d00074d0009297d000529f5010a2da402e6177e04bc002add00065d0160de0328232cdc006d0dff410000291f000100c027ed0007dc04651f545d1a085c001100004800130100a100034d00204c00090200040066696c65304000015002b2013104d404f7050200088003032e636f6c647e590201f9069e4001ec080131d60005273100322a3100331100000b00136000a1001fdc0011000069010000000000001a001200c1007edd0020dd0040dd009edd00d6de001201bc001100007e0100000000000008805cf90100535f0100a2010000000000001b001e00000600786174747231060000c401274d0032274d00321100000d001200c100024d00244c00110000b4010000000000000100000000000000d101", 0x1f2}], 0x0, &(0x7f00000001c0)=ANY=[]) fcntl$setstatus(r0, 0x4, 0x62400) 11:52:22 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/63, 0x3f, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:22 executing program 4: semctl$IPC_SET(0x0, 0x0, 0x1, &(0x7f0000001180)) [ 709.988794][T15046] loop4: detected capacity change from 0 to 264192 11:52:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef426000000e3bd6efb440009000e000a0010000000008000001207", 0x2e}], 0x1, 0x0, 0x0, 0xa}, 0x0) socket$kcm(0x10, 0x2, 0x0) [ 710.112631][T15050] loop3: detected capacity change from 0 to 61456 [ 710.160583][T15053] loop2: detected capacity change from 0 to 208 11:52:23 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) 11:52:23 executing program 4: select(0x40, &(0x7f0000000000), 0x0, 0x0, &(0x7f0000000100)={0x0, 0xea60}) 11:52:23 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000002580)=[{&(0x7f0000000340)='_', 0x1}], 0x0, 0x0) [ 710.309195][T15055] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 710.319528][T15053] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 710.319528][T15053] 11:52:23 executing program 1: r0 = socket$kcm(0x10, 0x2, 0x0) sendmsg$kcm(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000140)=[{&(0x7f00000000c0)="2e00000010008188040f80ecdb4cb9cca7480ef426000000e3bd6efb440009000e000a0010000000008000001207", 0x2e}], 0x1, 0x0, 0x0, 0xa}, 0x0) socket$kcm(0x10, 0x2, 0x0) [ 710.376752][T15053] ERROR: (device loop2): remounting filesystem as read-only [ 710.392892][T15050] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 710.392892][T15050] [ 710.405409][T15053] xtLookup: xtSearch returned -5 [ 710.429774][T15053] read_mapping_page failed! [ 710.452696][T15053] jfs_mount: dbMount failed w/rc = -5 [ 710.464975][T15066] netlink: 'syz-executor.1': attribute type 10 has an invalid length. [ 710.483187][T15053] Mount JFS Failure: -5 [ 710.488383][T15050] ERROR: (device loop3): remounting filesystem as read-only [ 710.502682][T15053] jfs_mount failed w/return code = -5 11:52:23 executing program 4: move_mount(0xffffffffffffffff, &(0x7f0000002000)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0) 11:52:23 executing program 0: perf_event_open$cgroup(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) [ 710.585207][T15050] xtLookup: xtSearch returned -5 11:52:23 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000003c0), 0x0, &(0x7f0000000480)={[{@shortname_winnt}], [{@defcontext={'defcontext', 0x3d, 'sysadm_u'}}]}) [ 710.653671][T15050] read_mapping_page failed! 11:52:23 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/63], 0x0) [ 710.736564][T15050] jfs_mount: diMount failed w/rc = -5 [ 710.753132][T15050] Mount JFS Failure: -5 [ 710.760537][T15050] jfs_mount failed w/return code = -5 11:52:23 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_NEW_INTERFACE(r0, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000200)={0x0}, 0x1, 0x0, 0x0, 0x20004800}, 0x4) [ 710.837086][T15072] FAT-fs (loop1): bogus number of reserved sectors [ 710.844363][T15072] FAT-fs (loop1): Can't find a valid FAT filesystem 11:52:23 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:23 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002c40)='smaps\x00') fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, &(0x7f0000000000)='**@-\x00', &(0x7f0000000040)=')', 0x1) 11:52:23 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1}, @jmp], &(0x7f0000000040)='syzkaller\x00', 0x3, 0xd3, &(0x7f0000000080)=""/211, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:52:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) [ 711.067761][T15075] loop2: detected capacity change from 0 to 208 [ 711.075207][T15080] loop3: detected capacity change from 0 to 61456 11:52:24 executing program 0: keyctl$search(0xa, 0x0, &(0x7f00000004c0)='rxrpc_s\x00', 0x0, 0xfffffffffffffffc) 11:52:24 executing program 0: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x4}, 0x14}}, 0x0) 11:52:24 executing program 0: syz_mount_image$vfat(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000001a40)=ANY=[]) 11:52:24 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000001480), 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000003f40)=[{0x0}], 0x0, 0x0) 11:52:24 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB=',mask=MAY_READ,']) [ 711.417165][T15075] jfs_mount: dbMount failed w/rc = -5 [ 711.418046][T15080] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 711.418046][T15080] [ 711.444625][ T26] audit: type=1400 audit(1639309944.360:308): avc: denied { mount } for pid=15094 comm="syz-executor.0" name="/" dev="tmpfs" ino=1 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 11:52:24 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[]) [ 711.467940][T15075] Mount JFS Failure: -5 [ 711.473744][T15075] jfs_mount failed w/return code = -5 [ 711.475288][T15080] ERROR: (device loop3): remounting filesystem as read-only [ 711.535995][T15080] xtLookup: xtSearch returned -5 [ 711.569182][T15080] read_mapping_page failed! [ 711.606967][T15080] jfs_mount: diMount(ipaimap) failed w/rc = -5 11:52:24 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/63], 0x0) 11:52:24 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000002580)=[{&(0x7f0000000080)="ae", 0x1, 0x1}, {&(0x7f0000000180)='P', 0x1}, {&(0x7f0000000280)="13", 0x1}, {&(0x7f0000000340)="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", 0xffe, 0x3}, {0x0, 0x0, 0xd19}], 0x0, &(0x7f0000002740)={[], [{@obj_user={'obj_user', 0x3d, ']\''}}]}) [ 711.668061][T15080] Mount JFS Failure: -5 [ 711.672791][T15080] jfs_mount failed w/return code = -5 [ 711.679533][ T26] audit: type=1400 audit(1639309944.590:309): avc: denied { unmount } for pid=3631 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:tmpfs_t tclass=filesystem permissive=1 [ 711.686419][T15099] tmpfs: Unknown parameter 'mask' [ 711.740157][T15101] EXT4-fs (loop1): VFS: Can't find ext4 filesystem 11:52:24 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:24 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000280)={[0x3]}, 0x8}) 11:52:24 executing program 4: openat$uhid(0xffffffffffffff9c, &(0x7f0000000080), 0x802, 0x0) 11:52:24 executing program 5: prlimit64(0x0, 0xe, &(0x7f0000000280)={0xc, 0x400000006}, 0x0) r0 = getpid() sched_setattr(0x0, &(0x7f0000000040)={0x38, 0x2, 0x0, 0x0, 0x9}, 0x0) sched_setattr(r0, &(0x7f0000000040)={0x38, 0x1, 0x0, 0x0, 0x3}, 0x0) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) write(r2, &(0x7f0000000340)="8411e5fee18a013cee514ebdb98b8eb6c214fbd2f2e984550fc8ecbbec4a872a20cf5311780a29abbbaed2b7f679ea9eb0a3a3a008ce9d7a64062895bf40b1a356b5a84a8aaa55d5c14412ab650ea91a55d4b2680bb688eb0dd7bd6cfa45bc381599e82f627a0cecd719441c7a5f53c290b0fe799d1b739fd8ee1383d614ce1c737931a0e88e02269ed12ed564f2c79cfea9db6f5f5b0ebf101bf419e8cd1bdb08f8c2c3f90702cd105c7c", 0x41395582) vmsplice(r1, &(0x7f0000000000)=[{0x0}], 0x1, 0x0) [ 711.939005][T15105] loop0: detected capacity change from 0 to 13 [ 712.007728][T15104] loop2: detected capacity change from 0 to 208 11:52:25 executing program 4: syz_open_dev$vcsu(0x0, 0x0, 0x0) geteuid() openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) [ 712.046224][ T26] audit: type=1400 audit(1639309944.950:310): avc: denied { read write } for pid=15106 comm="syz-executor.4" name="uhid" dev="devtmpfs" ino=1079 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 11:52:25 executing program 0: socketpair(0x2c, 0x80000, 0x0, &(0x7f0000000100)) 11:52:25 executing program 4: bpf$OBJ_GET_MAP(0x7, 0x0, 0x0) [ 712.184581][ T26] audit: type=1400 audit(1639309944.950:311): avc: denied { open } for pid=15106 comm="syz-executor.4" path="/dev/uhid" dev="devtmpfs" ino=1079 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:uhid_device_t tclass=chr_file permissive=1 11:52:25 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x19, 0x0, &(0x7f0000004f40)) 11:52:25 executing program 4: syz_mount_image$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)) [ 712.345245][ T26] audit: type=1400 audit(1639309945.260:312): avc: denied { create } for pid=15122 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=xdp_socket permissive=1 11:52:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000240), 0x0, 0x0, 0x1, &(0x7f0000001480)=[{&(0x7f00000003c0)="0e", 0x1}], 0x0, &(0x7f0000001500)) [ 712.401972][T15115] loop3: detected capacity change from 0 to 61456 [ 712.479997][T15104] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 712.479997][T15104] [ 712.510877][T15126] 9pnet: p9_fd_create_tcp (15126): problem connecting socket to 127.0.0.1 [ 712.578732][T15104] ERROR: (device loop2): remounting filesystem as read-only [ 712.584619][T15115] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 712.584619][T15115] [ 712.587050][T15104] xtLookup: xtSearch returned -5 [ 712.587123][T15104] read_mapping_page failed! [ 712.587342][T15104] jfs_mount: dbMount failed w/rc = -5 [ 712.590314][T15104] Mount JFS Failure: -5 [ 712.629616][T15104] jfs_mount failed w/return code = -5 [ 712.677225][T15115] ERROR: (device loop3): remounting filesystem as read-only [ 712.685179][T15115] xtLookup: xtSearch returned -5 [ 712.692003][T15115] read_mapping_page failed! [ 712.697533][T15115] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 712.706080][T15115] Mount JFS Failure: -5 [ 712.711865][T15115] jfs_mount failed w/return code = -5 11:52:25 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/63], 0x0) 11:52:25 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000100), 0x11, &(0x7f0000000140)={[{@shortname_win95}, {@fat=@flush}]}) 11:52:25 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/159, 0x9f, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:25 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpgid(0x0) sendmmsg$unix(r0, &(0x7f0000000cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[@rights={{0x14, 0x1, 0x1, [r0]}}, @cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}], 0x38}}], 0x1, 0x0) 11:52:25 executing program 5: r0 = fsmount(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0xffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB]) recvmsg$unix(r0, &(0x7f0000000740)={&(0x7f0000000340), 0x6e, &(0x7f0000000580)=[{&(0x7f00000003c0)=""/6, 0x6}, {0x0}], 0x2, &(0x7f00000005c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}], 0x60}, 0x143) 11:52:25 executing program 0: r0 = getpgid(0x0) r1 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r0}}}, @rights={{0x10}}], 0x50}, 0x20000001) [ 712.962207][T15132] loop5: detected capacity change from 0 to 127 [ 712.966223][T15131] FAT-fs (loop4): bogus number of reserved sectors [ 713.003206][T15131] FAT-fs (loop4): Can't find a valid FAT filesystem 11:52:26 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000340)='./file0/file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 11:52:26 executing program 5: syz_open_dev$mouse(&(0x7f0000000040), 0x0, 0x107001) 11:52:26 executing program 0: getgroups(0x1, &(0x7f0000000140)=[0xee00]) 11:52:26 executing program 4: fsopen(&(0x7f0000000080)='bpf\x00', 0x0) [ 713.158731][T15139] loop2: detected capacity change from 0 to 208 [ 713.206623][T15137] loop3: detected capacity change from 0 to 61456 11:52:26 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0f9628bd7000000000004f0000000c0099"], 0x28}}, 0x0) [ 713.319970][ T26] audit: type=1400 audit(1639309946.240:313): avc: denied { write } for pid=15145 comm="syz-executor.5" name="mouse0" dev="devtmpfs" ino=837 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:mouse_device_t tclass=chr_file permissive=1 11:52:26 executing program 0: add_key$fscrypt_v1(&(0x7f0000000100), &(0x7f0000000140)={'fscrypt:', @desc2}, &(0x7f0000000180)={0x0, "cab3c95bf419296f214b88dca5eb26df1ce914f096ac3e6dc16e82649467bcb93109798f86b217e64cb1df16a0a2bb9bafdf775d9ad7ba0357873a4a0e24fd69"}, 0x48, 0xfffffffffffffffb) [ 713.490599][T15137] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 713.490599][T15137] [ 713.497174][T15139] jfs_mount: diMount failed w/rc = -5 [ 713.550646][T15139] Mount JFS Failure: -5 [ 713.586294][T15137] ERROR: (device loop3): remounting filesystem as read-only [ 713.587855][T15139] jfs_mount failed w/return code = -5 [ 713.598812][T15137] xtLookup: xtSearch returned -5 [ 713.642424][T15137] read_mapping_page failed! [ 713.672566][T15137] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 713.699098][T15137] Mount JFS Failure: -5 [ 713.709826][T15137] jfs_mount failed w/return code = -5 11:52:26 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f500"], 0x0) 11:52:26 executing program 5: r0 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_SIOCADDRT(r0, 0x890b, &(0x7f0000002e40)={0x0, @sco, @generic={0x0, "6274ed4a06fa322759acc84c8fbb"}, @xdp}) 11:52:26 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:26 executing program 4: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, 0x0, 0x0, 0xffffffffffffffff) 11:52:26 executing program 1: r0 = socket$inet(0x2, 0x3, 0x6) recvmmsg(r0, &(0x7f0000001380)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 11:52:26 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)='system.posix_acl_access\x00', &(0x7f0000002040), 0x24, 0x0) 11:52:26 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x40}}, 0x0) 11:52:26 executing program 5: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000020c0)={0x0, {{0xa, 0x4e23, 0x0, @private1}}, 0x0, 0x1, [{{0xa, 0x0, 0x0, @private1}}]}, 0x110) 11:52:26 executing program 0: fsmount(0xffffffffffffffff, 0x0, 0x5) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="d9", 0x1, 0x11}], 0x0, &(0x7f0000000200)=ANY=[@ANYRESDEC=0x0]) [ 714.089781][T15170] loop2: detected capacity change from 0 to 208 [ 714.136671][T15170] read_mapping_page failed! [ 714.156341][T15170] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 714.184449][T15170] Mount JFS Failure: -5 [ 714.201745][T15170] jfs_mount failed w/return code = -5 11:52:27 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000002580), 0x0, &(0x7f0000002740)) [ 714.227299][T15171] loop3: detected capacity change from 0 to 61456 [ 714.250753][T15176] FAT-fs (loop5): bogus number of reserved sectors 11:52:27 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) recvmsg$unix(r0, &(0x7f0000000300)={&(0x7f0000000040), 0x6e, &(0x7f0000000240)=[{&(0x7f00000000c0)=""/127, 0x7f}, {&(0x7f0000000140)=""/244, 0xfffffe7b}], 0x2, &(0x7f0000000280)=[@rights={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x40) [ 714.316721][T15176] FAT-fs (loop5): Can't find a valid FAT filesystem 11:52:27 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f500"], 0x0) 11:52:27 executing program 5: syz_usb_connect(0x0, 0x24, &(0x7f0000000580)={{0x12, 0x1, 0x0, 0xf9, 0xde, 0x24, 0x40, 0xc26, 0x9, 0x4e57, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x4a, 0x40, 0x57}}]}}]}}, 0x0) [ 714.528749][T15181] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 11:52:27 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x0, 0x2, &(0x7f0000000000)=@raw=[@map={0x18, 0x0, 0x1, 0x0, 0x1}], &(0x7f0000000040)='syzkaller\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 714.677752][T15185] loop2: detected capacity change from 0 to 208 [ 714.732272][T15171] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 714.913949][T15185] jfs_mount: diMount failed w/rc = -5 [ 714.961578][T15185] Mount JFS Failure: -5 [ 714.967820][T15185] jfs_mount failed w/return code = -5 [ 714.981442][T15171] Mount JFS Failure: -5 [ 715.016493][ T3679] usb 6-1: new high-speed USB device number 2 using dummy_hcd [ 715.048638][T15171] jfs_mount failed w/return code = -5 11:52:28 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:28 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000280)={0x18, 0x5, &(0x7f0000000040)=@framed={{}, [@map={0x18, 0x0, 0x1, 0x0, 0x1}]}, &(0x7f00000000c0)='GPL\x00', 0x3, 0xa5, &(0x7f0000000100)=""/165, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:52:28 executing program 1: mount$9p_unix(&(0x7f0000000f00)='./file0\x00', 0x0, &(0x7f0000000f80), 0x0, 0x0) 11:52:28 executing program 0: add_key$fscrypt_v1(&(0x7f0000000000), 0x0, &(0x7f0000000200)={0x0, "ace7792ecb93c83e2f30e6d824770051c69466927c1b84f0401ae712a8545213ade4f23cd01ca829ba0f5240841be5154531b0766027dbefb77d71a799a6cb12"}, 0x48, 0xfffffffffffffff8) 11:52:28 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f500"], 0x0) [ 715.616454][ T3679] usb 6-1: New USB device found, idVendor=0c26, idProduct=0009, bcdDevice=4e.57 [ 715.625640][ T3679] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 11:52:28 executing program 0: pselect6(0x0, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000240), &(0x7f00000002c0)={&(0x7f0000000280)={[0x3]}, 0x8}) [ 715.703918][ T3679] usb 6-1: Product: syz [ 715.717104][ T3679] usb 6-1: Manufacturer: syz [ 715.721752][ T3679] usb 6-1: SerialNumber: syz 11:52:28 executing program 4: add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) fsmount(0xffffffffffffffff, 0x0, 0x0) 11:52:28 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000002580)=[{&(0x7f0000000080)="ae", 0x1, 0x1}, {&(0x7f0000000180)='P', 0x1, 0x1ff}, {&(0x7f0000000280)="13", 0x1}, {&(0x7f00000002c0)="03", 0x1}, {&(0x7f0000000340)}], 0x0, &(0x7f0000002740)) [ 715.770004][T15200] loop2: detected capacity change from 0 to 208 [ 715.794320][ T3679] usb 6-1: config 0 descriptor?? [ 715.866914][T15200] jfs_mount: diMount failed w/rc = -5 11:52:28 executing program 4: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) select(0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)={0x0, r0/1000+10000}) [ 715.918060][ T3679] ftdi_sio 6-1:0.0: FTDI USB Serial Device converter detected [ 715.928745][T15200] Mount JFS Failure: -5 [ 715.947889][ T3679] usb 6-1: Detected FT-X [ 715.965087][T15200] jfs_mount failed w/return code = -5 11:52:28 executing program 0: mount$cgroup(0x0, 0x0, 0x0, 0x0, &(0x7f0000000080)={[{@release_agent={'release_agent', 0x3d, './file0'}}, {}], [{@smackfsroot}]}) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x2, &(0x7f0000001480)=[{0x0, 0x0, 0xeea}, {0x0, 0x0, 0x3f}], 0x0, &(0x7f0000001500)) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000001f80)={&(0x7f0000001ec0), 0xc, &(0x7f0000001f40)={0x0}, 0x1, 0x0, 0x0, 0x80}, 0x20004890) setxattr$system_posix_acl(0x0, &(0x7f0000002000)='system.posix_acl_access\x00', 0x0, 0x0, 0x1) setsockopt$inet6_MCAST_MSFILTER(0xffffffffffffffff, 0x29, 0x30, &(0x7f00000020c0)={0x0, {{0xa, 0x4e23, 0xb9, @private1={0xfc, 0x1, '\x00', 0x1}}}, 0x0, 0x3, [{{0xa, 0x0, 0x0, @private1, 0xffffffff}}, {{0xa, 0x0, 0x0, @loopback}}, {{0xa, 0x4e22, 0x80000000, @private1}}]}, 0x210) lgetxattr(0x0, &(0x7f0000002540)=@random={'user.', 'clone_children'}, &(0x7f0000002580)=""/140, 0x8c) [ 716.090384][T15210] loop1: detected capacity change from 0 to 1 [ 716.166583][ T3679] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 716.186409][ T3679] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 716.258605][ T3679] ftdi_sio 6-1:0.0: GPIO initialisation failed: -71 [ 716.301523][T15214] loop0: detected capacity change from 0 to 14 [ 716.309038][ T3679] usb 6-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 716.339558][T15214] FAT-fs (loop0): bogus number of reserved sectors [ 716.390494][ T3679] usb 6-1: USB disconnect, device number 2 [ 716.399012][T15214] FAT-fs (loop0): Can't find a valid FAT filesystem [ 716.485426][ T3679] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 716.544227][ T3679] ftdi_sio 6-1:0.0: device disconnected [ 716.550371][T15205] loop3: detected capacity change from 0 to 61456 11:52:29 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYBLOB="100000000000000001"], 0x38}, 0x0) 11:52:29 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab981"], 0x0) [ 716.712382][T15205] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 716.736529][T15205] Mount JFS Failure: -5 [ 716.744458][T15205] jfs_mount failed w/return code = -5 11:52:29 executing program 1: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000380), 0x0, 0x0) write$FUSE_LK(r0, 0x0, 0x0) 11:52:29 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x10, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:29 executing program 0: socket$inet6(0xa, 0x1, 0xffffffff) 11:52:29 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000008ac0)={0x0, 0x0, &(0x7f0000008a80)={0x0}}, 0x0) sendmsg$TIPC_NL_MEDIA_SET(r0, &(0x7f0000000580)={&(0x7f0000000440)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f0000000540)={&(0x7f0000000480)=ANY=[], 0xa0}}, 0x0) [ 716.894424][T15217] loop2: detected capacity change from 0 to 208 11:52:29 executing program 5: rt_sigtimedwait(&(0x7f0000000000), 0x0, 0x0, 0x8) 11:52:29 executing program 1: pselect6(0x40, &(0x7f0000000fc0)={0x200}, &(0x7f00000060c0)={0x1}, &(0x7f0000006100)={0x3}, &(0x7f0000006140)={0x0, 0x3938700}, 0x0) 11:52:29 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x29, 0x0, 0x0) [ 717.086095][T15217] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 717.086095][T15217] 11:52:30 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000002c40)='smaps\x00') fsconfig$FSCONFIG_SET_PATH(r0, 0x3, &(0x7f0000000000)='*@\x00', &(0x7f0000000040)='./file0\x00', 0xffffffffffffff9c) [ 717.201890][T15217] ERROR: (device loop2): remounting filesystem as read-only [ 717.237890][T15217] xtLookup: xtSearch returned -5 [ 717.279185][T15227] loop3: detected capacity change from 0 to 61456 [ 717.289851][T15217] read_mapping_page failed! 11:52:30 executing program 0: syz_mount_image$vfat(&(0x7f0000000240), 0x0, 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000003a80), 0x0, 0x0, 0x0, &(0x7f0000003f40), 0x0, &(0x7f0000004000)) [ 717.344114][T15217] jfs_mount: dbMount failed w/rc = -5 [ 717.452283][T15217] Mount JFS Failure: -5 11:52:30 executing program 1: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002c40)='smaps\x00') fsconfig$FSCONFIG_SET_BINARY(r0, 0x2, 0x0, 0x0, 0x0) [ 717.489947][T15217] jfs_mount failed w/return code = -5 11:52:30 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x20001458}, 0x0) [ 717.611668][T15227] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 717.639637][T15227] Mount JFS Failure: -5 11:52:30 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab981"], 0x0) [ 717.714585][T15227] jfs_mount failed w/return code = -5 11:52:30 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg$unix(r0, &(0x7f000001ec00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x140, 0x0) 11:52:30 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {0x0, 0x0, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:30 executing program 1: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x0, 0x0) getpeername(r0, 0x0, 0x0) 11:52:30 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)=ANY=[]) 11:52:31 executing program 5: fsopen(&(0x7f0000000000)='bdev\x00', 0x0) [ 718.116544][T15246] loop2: detected capacity change from 0 to 208 11:52:31 executing program 4: pselect6(0x40, &(0x7f0000000fc0), &(0x7f00000060c0)={0x1}, 0x0, 0x0, 0x0) 11:52:31 executing program 1: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) getpgid(0x0) sendmmsg$unix(r0, &(0x7f0000000cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[@rights={{0x10}}, @rights={{0x10}}], 0x20}}], 0x1, 0x0) 11:52:31 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000100), 0x0, 0x0) ioctl$BLKSECTGET(r0, 0x1267, &(0x7f0000000140)) [ 718.407152][T15246] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 718.407152][T15246] 11:52:31 executing program 5: pselect6(0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f00000017c0)={&(0x7f0000001780), 0x8}) [ 718.452376][T15256] loop3: detected capacity change from 0 to 61456 11:52:31 executing program 4: getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000000040)=0x46) r0 = gettid() sched_rr_get_interval(r0, &(0x7f00000001c0)) [ 718.540572][T15246] ERROR: (device loop2): remounting filesystem as read-only 11:52:31 executing program 0: syz_mount_image$fuse(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x288020, &(0x7f0000000200)) [ 718.602605][T15246] xtLookup: xtSearch returned -5 [ 718.636461][T15246] read_mapping_page failed! [ 718.641519][T15246] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 718.711391][T15256] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 718.720043][T15246] Mount JFS Failure: -5 [ 718.724409][T15246] jfs_mount failed w/return code = -5 [ 718.747282][T15256] Mount JFS Failure: -5 [ 718.752011][T15256] jfs_mount failed w/return code = -5 [ 718.854702][ T26] audit: type=1400 audit(1639309951.770:314): avc: denied { remount } for pid=15267 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fs_t tclass=filesystem permissive=1 11:52:31 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {0x0, 0x0, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:31 executing program 1: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x0) connect$vsock_stream(r0, 0x0, 0x0) 11:52:31 executing program 4: ioprio_set$pid(0x0, 0xffffffffffffffff, 0x4000) 11:52:31 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab981"], 0x0) 11:52:31 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0xffff, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="d9", 0x1}], 0x0, 0x0) 11:52:31 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GROUP_SET(r0, &(0x7f00000013c0)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x210001cc}, 0xc, &(0x7f0000001380)={0x0}}, 0x0) 11:52:31 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}, 0x0) [ 719.148225][T15278] loop0: detected capacity change from 0 to 127 11:52:32 executing program 1: io_uring_setup(0x0, 0x0) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) select(0x40, &(0x7f0000000040)={0x10001, 0x0, 0x0, 0x401, 0x400, 0x3800, 0x9}, &(0x7f0000000080)={0x1, 0x0, 0x3, 0x2}, 0x0, &(0x7f0000000140)={r0, r1/1000+10000}) 11:52:32 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=tcp']) [ 719.313372][T15282] loop2: detected capacity change from 0 to 208 [ 719.452651][T15290] loop3: detected capacity change from 0 to 61456 [ 719.491567][T15282] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 719.491567][T15282] [ 719.504993][T15282] ERROR: (device loop2): remounting filesystem as read-only [ 719.513947][T15282] xtLookup: xtSearch returned -5 [ 719.520066][T15282] read_mapping_page failed! [ 719.524980][T15282] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 719.539321][T15282] Mount JFS Failure: -5 11:52:32 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/nf_conntrack\x00') read$FUSE(r0, 0x0, 0x0) 11:52:32 executing program 4: pselect6(0x0, 0x0, &(0x7f0000000040), 0x0, 0x0, 0x0) 11:52:32 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r0, @ANYRES32], 0x38}, 0x0) [ 719.550969][T15282] jfs_mount failed w/return code = -5 [ 719.626728][T15290] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 719.698177][T15290] Mount JFS Failure: -5 [ 719.739070][T15290] jfs_mount failed w/return code = -5 11:52:32 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {0x0, 0x0, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:32 executing program 0: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan3\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan1\x00'}) r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_read_part_table(0x7fffffff, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000200)="a6609ca51db7f2d59b3bbffac1c86d391fb42d2e191e365fe0318a5f30725dd15ed932c66e697b57286e2de384798ecb29e5c70e03946d55877ecf", 0x3b, 0x7}, {&(0x7f0000000240)="4d7a55bf595a755ffaf2954069e5c619bb7cda92277ac108037d7c4aeecd944ea7928f4ee87e89834c884ed8a9dec818954c4e049a34b058ff95f3417edcfbe00ee84341cc4e2984e7155506d72749bac8211eb6bdca6606f7f7aef433611218fd5b76a196fc720c58ee0264658886b3251f08d1467c865bd46f6dd511ae2b381afd00f502347e4c57bc3b5a9bbae1355c32700158009628b07cb648f1f604f378781946ae6c3999f2e77302afee1fc0d702b75b442dc8fecc19a682986a4607fca6b9550023c6a9d4ebc55a11f4e2871780530d51ab9682a0c9cdc58b0341", 0xdf, 0x7}, {&(0x7f0000000340)="685d0e0c5e90978fcfb8ada8d3d91a26d3c25e9f736d1d9a147e91fbf7567a0179f94b582c4a7da5e2a3024a3415ae49a2030fbccda786805931701d82c47275ab135953c401dadb0c2e5ab735ee2d5ab3ca", 0x52}]) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000004f40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 11:52:32 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab9810000000000"], 0x0) 11:52:32 executing program 1: r0 = fsopen(&(0x7f0000000240)='ext3\x00', 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 11:52:32 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000680), 0x10) [ 719.992002][T15302] loop0: detected capacity change from 0 to 264192 11:52:33 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000100), 0x0, 0x0) read$FUSE(r0, &(0x7f0000004c40)={0x2020}, 0x2020) [ 720.044922][T15303] loop2: detected capacity change from 0 to 208 [ 720.129099][T15303] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 720.129099][T15303] [ 720.159343][T15303] ERROR: (device loop2): remounting filesystem as read-only [ 720.166868][T15303] xtLookup: xtSearch returned -5 11:52:33 executing program 0: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_tables_targets\x00') [ 720.261197][T15303] read_mapping_page failed! 11:52:33 executing program 5: fsmount(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', 0x0, 0xffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[]) [ 720.372847][T15303] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 720.438461][T15303] Mount JFS Failure: -5 [ 720.448441][T15309] loop3: detected capacity change from 0 to 61456 [ 720.467992][T15303] jfs_mount failed w/return code = -5 11:52:33 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) getpeername(r0, 0x0, &(0x7f0000000140)) 11:52:33 executing program 0: syz_mount_image$msdos(&(0x7f00000084c0), &(0x7f0000008500)='./file0\x00', 0x0, 0x0, &(0x7f000000a840), 0x2001850, &(0x7f000000a940)) 11:52:33 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab9810000000000"], 0x0) [ 720.664182][T15317] loop5: detected capacity change from 0 to 127 [ 720.717319][T15309] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 720.731935][T15309] Mount JFS Failure: -5 [ 720.746803][T15309] jfs_mount failed w/return code = -5 11:52:33 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000004200)='./file1\x00', 0x0, 0x0, 0x0) 11:52:33 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00), 0x0, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:33 executing program 4: bpf$PROG_LOAD(0x5, &(0x7f0000005040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:52:33 executing program 0: r0 = getpgrp(0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000003480)={r0, 0xffffffffffffffff, 0x0, 0x0, 0x0}, 0x30) 11:52:33 executing program 5: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000080)={'wpan3\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan1\x00'}) r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_read_part_table(0x0, 0x2, &(0x7f00000003c0)=[{0x0, 0x0, 0x7}, {&(0x7f0000000340), 0x0, 0x3ff}]) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000004f40)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) 11:52:34 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000002580)=[{&(0x7f0000000080)="ae7367ad0470c7b123f5fe82453af6f5e630e2d7f7fd42c721fb11e5fd1d1bbf503cf6c85e07493f7d04f186ba5dc56a4854038ffbd659b3f0f3c057617cdd6e6bcfdae5d027043c6133cf1401e3c5082d7dd86ab52ffc27e709882c85f0f22505f6ac86fc6c871138d6e93680ab7cb56ccf17a68c0512daa3ebd2faec75ecbccc0a0c9fd37aa5034f48fef1031716e2399760b1ed35bcd0c6c3904d0b59320d3fd45014b33d44a90fbf17c17cc62a94b6aa6507041a798a1c2f5e6c38ececc9489ec3b7", 0xc4, 0x1}, {&(0x7f0000000180)="50990c39d2e95ea594b309949711050f52cf018db55e9aa129fabd46b0e95409e6d7cdda22603bc5a77ec585c3e278277f3f8b34943e101d91de5f8cf6e07761514429678e590aa04c93cc48b035cfce210698a101e57e2fba5a6327b6b3e4cda328f8d5894699b9a1a1de4cf20b4f2cf860a1b975907925a1401a399d21a26811aa02b79b3b04e3ecddf6a07b13c7ab7ffb", 0x92, 0x1ff}, {0x0}, {&(0x7f0000000340)="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", 0x402}], 0x0, &(0x7f0000002740)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x10001}}, {@oldalloc}, {@sysvgroups}, {@dioread_lock}, {@delalloc}, {@dax}], [{@smackfshat={'smackfshat', 0x3d, '#'}}, {@smackfshat={'smackfshat', 0x3d, '&N-\'\''}}, {@smackfstransmute={'smackfstransmute', 0x3d, '-\x87{^]/.'}}, {@fowner_eq}, {@obj_user={'obj_user', 0x3d, ']\''}}]}) 11:52:34 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$IEEE802154_SET_MACPARAMS(r0, &(0x7f0000000540)={0x0, 0x0, &(0x7f0000000500)={&(0x7f0000000480)={0x14, 0x0, 0x1}, 0x14}}, 0x0) [ 721.159186][T15324] loop2: detected capacity change from 0 to 208 11:52:34 executing program 0: syz_mount_image$msdos(&(0x7f00000084c0), &(0x7f0000008500)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f000000a940)={[], [{@defcontext={'defcontext', 0x3d, 'staff_u'}}]}) [ 721.265315][T15330] loop3: detected capacity change from 0 to 61456 [ 721.265527][T15335] loop5: detected capacity change from 0 to 3 [ 721.335330][T15339] loop4: detected capacity change from 0 to 2 11:52:34 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, &(0x7f0000003e00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x102, 0x0) [ 721.408636][T15324] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 721.408636][T15324] [ 721.409961][ T3779] Dev loop5: unable to read RDB block 3 [ 721.460982][ T3779] loop5: unable to read partition table [ 721.484879][T15324] ERROR: (device loop2): remounting filesystem as read-only [ 721.504605][T15330] jfs_mount: diMount(ipaimap) failed w/rc = -5 11:52:34 executing program 0: syz_genetlink_get_family_id$nl802154(&(0x7f0000000dc0), 0xffffffffffffffff) [ 721.515123][ T3779] loop5: partition table beyond EOD, truncated [ 721.528278][T15324] xtLookup: xtSearch returned -5 [ 721.545697][T15330] Mount JFS Failure: -5 [ 721.551918][T15330] jfs_mount failed w/return code = -5 11:52:34 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADDDEF(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(r0, &(0x7f00000006c0)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000680)={0x0}}, 0x0) [ 721.563201][T15324] read_mapping_page failed! [ 721.573837][T15335] Dev loop5: unable to read RDB block 3 [ 721.573932][T15324] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 721.588672][T15335] loop5: unable to read partition table [ 721.594515][T15335] loop5: partition table beyond EOD, truncated [ 721.626932][T15335] loop_reread_partitions: partition scan of loop5 () failed (rc=-5) [ 721.641757][T15324] Mount JFS Failure: -5 [ 721.652335][T15324] jfs_mount failed w/return code = -5 11:52:34 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00), 0x0, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:34 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab9810000000000"], 0x0) 11:52:34 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000002580)=[{&(0x7f0000000080)="ae", 0x1}, {&(0x7f0000000340)="5f0eedcad8964ce9e109f8b6f0b70a9009864554dc8a0c9fd6e6b6f1f0011d8a326680c7f71316ff81d15f7c63ca1f05d98ec0e0be8303973a6c5f18f4e71795b2646762f378164e2be9e3a5e79a7e20511646a758ee846a93bbc904cf5caf7f231f8ec4542177dcbdcb8770ac4e48aad0e6d17911c8fd622676900dd2ed4de92d3cd8575ee3d31683475116bff5bb82a69507e682c2cf11a6f2a8c2dfde0700439e34212fe14919dc17dca9375f7e043599d800862ed02c1a94c990128408281f149f8fb9c32555b02b57d3150e80f28bddce96f2f15be6ee50a3c46a846a8e88651cbc386ef8fc8226ca25c533fd571c7118d21e34841b731589e79e748ef13dbc9dbd91ec8920dacb672def972e55bf89767b24e237997dae51a8ecbf862c96a228473a5abac6fa3a0e6ca5d4cec0b32b3c0a0e91ccb8a15f1e5287b3f617667a48367038a8a5d755a5fc3a9750283fb51c029ef75b022b22895fb9af45fe1b6675cdc2710a0e5b1a62761ec9933fa63726ae1afc40cc5ecac381b4cd57af66744320ae940185fd363efb4bfdea8254684846e57f89cd08032af4e9584a65413cb51f81b6d6df5ef554355ab975217c2c4f6ac710b29eb490f720e6425be931ab5a57fff85030a6452d1f7d4ac40f44a6acbfd2823c1374baab783e8302d9b5c750d24f421b87651c79d76663c3ef491f79cea6e41223eb62168ae0136be4048ab2bc2b78ba895da87725cd185cc34c2a89dff1b575977d829062df9189feea84920a31761d7ea8aa07d1042879eaba9d7cfd9e0de2234a6f16ed61161a73fe63e934c982861dbdc41a19b8fab127818ece24a1ff3414810e64c6ca3e12af372c7ff499ebe13d0c23d87a17c3404f8461bb5157ce10e1f5110c52773b54c5a527ff1dc131fcc19dbd47274cd4d2303e265401a4b22b3cf15c4f32e363929de7bbcb3bbffbcdb5b6eca8128f68789b7b88e30d0d0621699b28fa2391093898410bf0a48b3eed6f6a3b00a46f2fec2bd002246b1ffc5a76a63752ff0dca33f24c1dfd0aa3a698bf5bc5d16a6ef905a96fbdadd2951f54c2790dde59b66e63078d7d41a8b0f0fdee3ac70c4dea5e18a17ddc8b39ebfca4d41d273989a9d6417bd7ebba43a3170a26c2d556a570608415dbb91a85fc8d5d0bcf4c6f71556fb70250d759b46c9709644a1495dc205e6d37e4173607694e9ef93246acb88d46eceee31e4c60102b200edfe83b545df893d139aea8a4d6d1855eeb5dccc4399defd6f1ada8f5ac12950a1b047eb12645fc07f1e1310dae8eea9d21bc0fcfdb43ec39ab865cc53a4c570391975989ca338bd15203be6a331bfdf9d8404b61c1d4669402f055a57e18157c83fd9e18ed2448dfd067b90ba0cb0b4b3a2dbdb571c7df529f1323d2ff218257ade4329dfcf74d875b9464e28a2d73a0c385babac3b95e47e524dc2f896bffb3b8ce4339122b90df34dce708b9628eb17f31e8f38f4548494cd7338a313c2c4b194a47b6d36ee6862283ab8cc5df2a7fe06e4e9428723939dd2b8b6ac71814c2274923d6d4195e0022c9a500997ebaf5c7619f75f08c4372c197d4618023d8fba2aa6b7ad1ea0938186cfd3d1586c39e90704a1be6e7f77d55cbb8da1af4502e09f32ed0edb387aa746eaa47028e35df7932f1dfc840b8fb6bdb16fb8f34aba7623cd5c8c98d6a6dc87aabfec56e61d811f65d23c7dce3c3fed2f858551558091db0ba62250124ebf6bd42ad748ef90a8e8f50165441eaee06cf847a3d9d8da9088155098a44f71d79f415c7842b5e73b4fc1716018e95354227cf23de58e32a8d6b9749223c55d9d0c932ea36abd49adbb2f1d4424bc4d1eb25817347a6d2f9ed80d658227c70184c704353878cb3d2826b4a5480076132a3208d4f335e9f8545b1d8bc8d2e1ba8f68bfe208a1cda8dd006a2d9443820eb7e637156f0976df4bcd4ae89d4082dc04e4cd1bf5e25f7f623db3415501365e024d3afa15520ac8574e615bb7b6afcd2377050b46777ff1f7a7864843fa4b5d781cd2316de0cf380f30e0f113e36779d12a2e37f4a2d2edeee0ef4630eb57b4d8b14dabb2ae57d41c14c4bbb1c5bae1c71a776cf29db744467e975f40014d816989eb2eec00999150e0c41775b5149dbcf38dc3309283aae651851314c767da3a4d6b94f14dc2ef00b0e85e24a8d60e7380191033edb51bb6bd8cd591e88d157ca266eb0024b2757987acadff98b2a9438a431223e52f10c26aa36471f01cf102c7043427509e460b7b509464cce8ebcc60702187ca6ff620bff6b9c76ec7601ccd3ba888b89cf925c133fb505d51855c8666b2bb87f49ed26a5c73ece1d52799882d703fc8a7011406b91088436998863cf5f75807fa08cf3c27b3e2db4a3dafec2db18cd7c3a27699d4f399e9da5d7a127cebc959801bbe19384ff9d81a83935e60463a32329d1885a88c64d18ee94b98952ef42ed840db10c6731a213d903e8298290c379097d3796ba63a787be4d8443e6b57cf6e9124800eb09b8144cb4b7e6346c67b4d09dea3be11abeb7e3451d4fd47ebe76b53fe669324dbf2d505fb93159e71897e56e6c253bf25b4374c7150cd4e33ffc56b5e7e8901f21e3793164bd1f6ebfccfcfa8e7cb3c08b171f48054238c86dd37d985dcfcb0ad5e103d1e4962be1705fd18ccea2498ed8cbc546cafebdf1336023ab444ee88200c9a7037a49d9b3d28b78366dfcfde9ba3f359eeadbd65e8faf5df27d8bbf120fe5693ca8f11e92d32005e53ecc7e096d495c9a65fde26534a70a0a2d0b779371be89233a137dbe54028dbd8f901c5807cb41f78606a662889a194dacbc6fd9d9b3f81267692aa710ee72f8f4c7c7e39b9fe6107438deea08c29983f69c1bfa085d5f3f1aa75ac4c17076dd215711294030b25f569a667e999692beabdf9fefd039046f59f70bfe643bb7768c32254ea86d4ac106300083c28cdb4d58e11a3b0734590d66c8fa94edd81265c1285fec716bbf496941f02897fa7b6113dfad003608bac31ebe924ca49bc388a6e3b1159836c93cd2759969bcc11b3c659cfc6817a923906c39afc03d5bb7bb260f2de10d2a5edfa7ab6b1806c3979fe0a3441dea8950620f2e1d4b67741014a886d10ce09da22f44ab099b39d28310e4a968f4f5e34a296d1f856eee043a661d6dc17c6989145289a63e363d9defb46356cfeb755a44da7a5d09a2ecf9ac59b83ec4f410723c5ce2c7deab27b07b66ba6f05f5973f79e5d24f51ab6642e9022145d5b998ad340067e864ef5cc32b5870a556afaae969e7465afe09a1c3671b1834a6ed08becebef8abe74dece9496882f463c762817133ea88c0c3fdcb0a12e31245c1c3c581dd504c7d778ad6eb5a65ad321801bd1f762f9dad58dd6797659df4f96bb71a4ed812f33d50c35adbaaf2d8317043e895836d2c5db200a2308761a08e57ab8b70389d411cefbc93119fa4b62f4fc5875cc29dc61a2be402be251b9464cf3409d255a447f68b1ee50c6de37391a7eee46e86c5708c7afb0a5f51b32e3841c0bb2914282a11b9ce12b07fb406efc146108d8e9c635a10c1b5d45db1603f892aabf92fb551bc995149ec29e47851d3da79afe44e015ab1cb2c95b9333978723ef4d9dee3b5b48553714d170e98d9477821d16f14e5a7b9f2ea81bae88cfe5e7aece1efeeecbd87a4ba1014d7880e7fa000d136272252f83b5fe23d2f4ad7ff674991e56bc972c986964e00affe0d4d1e22059c85ab103fe801b40cb277d67348b41d7611951c47ef702543453ce4caa5bc89a7d01df2a28b7ad067dc1727d9dd8ea99cb36db0203fdcef88687bdb958c0598d60097d50ac8cff8d2c704a3a0ba85d1c5038eefb1255f64d205c9959ad8efcdf11437949b27e26eb351958929ddb72041fc5fd9493b1646c4edb0974feae34b964dd7eb4e1486cdd68fe2e7fdeca5f0343a087b60d45955b501f57d2a137b0e085dd39c230d625e94afb68431707ca8f48f589c94844e3d7a639b2e6e55891d47fe6923a38a8dd76b84cf1542d18c745b16521ce456e29ee411b87774b8bfc75b4df88fa9805014c8539b7c1ef2dc5db3fd06cd7aa8b6c59cad353f6e3ee02f6435bc75d90b6f99704684b7a5fa53236d85ea9b6d02135924b20826815cb19c63d10f9fbe0a568b3e77eb29ec88737a8153b76bde8cd4e2535b40df8a5b4ec194247431adeb49efd39bad3d9e5b0de3e9227e0f5fe0b3295d80fa1ca45ed9fc0063b1e7cd18bcc501c7ff344db426c7e0e4528757f5028d608c8205cd11733a8d6d5911daeb6b9da8647c0843db5b1be8d76ac7a7e12525728dbe31ad8448678dfb54335f63937f704a65c5b234e6d1b34f545fbb081acf4207415e7215df026e641cd2979ee4a0f1a99bdcef297f9d45710f22f2b53a0c8c7174905c535e1b11be7063de9a2b404f455041a220b1ef7cad0992e1f36c79f940a46f5698a2c1acb558b899a63e70f8d626a77e6218bf1319e942c84a5887a70820cc30c7ccc237522ca38e5783ce42b1b067a16e3da18a508e9743791a6b62c6856bcaed5aaaa2a4a5afa63d6e12119d333f46d4ed342d5d973db7443a4a9ed2a8fb5cc160aa6995", 0xcc1}], 0x0, 0x0) 11:52:34 executing program 0: syz_mount_image$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[], [{@fsuuid={'fsuuid', 0x3d, {[], 0x2d, [], 0x2d, [], 0x2d, [], 0x2d, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x37]}}}]}}) [ 721.852745][T15352] loop5: detected capacity change from 0 to 6 11:52:34 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x2, 0x0, &(0x7f0000004f40)) 11:52:34 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x17, 0x0, &(0x7f0000004f40)) [ 722.023954][T15353] loop3: detected capacity change from 0 to 61456 11:52:35 executing program 4: syz_mount_image$vfat(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000001a40)=ANY=[@ANYBLOB=',mask=MAY_READ,permit_directio,appraise']) 11:52:35 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x4, 0x8, 0x0, 0x0) [ 722.173180][T15353] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 722.183960][T15361] loop2: detected capacity change from 0 to 208 [ 722.191298][T15353] Mount JFS Failure: -5 [ 722.206110][T15353] jfs_mount failed w/return code = -5 [ 722.244296][T15361] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 722.244296][T15361] [ 722.362509][T15366] tmpfs: Unknown parameter 'mask' 11:52:35 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00), 0x0, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) [ 722.427228][T15361] ERROR: (device loop2): remounting filesystem as read-only [ 722.483868][T15361] xtLookup: xtSearch returned -5 11:52:35 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)='system.posix_acl_access\x00', &(0x7f0000002040)={{}, {}, [{}], {}, [{0x8, 0x0, 0xee01}]}, 0x34, 0x0) 11:52:35 executing program 5: syz_open_procfs$namespace(0x0, &(0x7f00000000c0)='ns/time\x00') 11:52:35 executing program 4: syz_mount_image$fuse(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000000c0)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xffffffffffffffff}, 0x2c, {'group_id', 0x3d, 0xee01}, 0x2c, {[], [{@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@fscontext={'fscontext', 0x3d, 'sysadm_u'}}]}}) [ 722.548625][T15361] read_mapping_page failed! [ 722.593290][T15361] jfs_mount: dbMount failed w/rc = -5 [ 722.626670][T15361] Mount JFS Failure: -5 [ 722.631236][T15361] jfs_mount failed w/return code = -5 11:52:35 executing program 5: socketpair(0xa, 0x2, 0xb3, &(0x7f00000000c0)) [ 722.691758][T15374] fuse: Bad value for 'fd' 11:52:35 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab9810000000000000000"], 0x0) 11:52:35 executing program 4: socketpair(0x10, 0x0, 0xff, &(0x7f0000000100)) [ 722.793772][T15355] 9pnet: p9_fd_create_tcp (15355): problem connecting socket to 127.0.0.1 11:52:35 executing program 0: openat$dir(0xffffffffffffff9c, &(0x7f0000009700)='./file0\x00', 0x641, 0x0) syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000000240), 0x2414c3, &(0x7f00000002c0)) 11:52:35 executing program 1: pselect6(0x40, &(0x7f0000000fc0)={0x200}, 0x0, 0x0, &(0x7f0000006140)={0x0, 0x3938700}, 0x0) [ 722.868405][T15373] loop3: detected capacity change from 0 to 61456 [ 723.119515][T15373] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 723.140083][T15373] Mount JFS Failure: -5 [ 723.148890][T15373] jfs_mount failed w/return code = -5 11:52:36 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0xc, 0xffffffffffffffff, 0x1aa4}, 0x40) 11:52:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) recvmsg$unix(r1, &(0x7f00000127c0)={0x0, 0x0, 0x0}, 0x0) 11:52:36 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_SEC_PARAMS(r0, &(0x7f0000002240)={&(0x7f0000002180), 0xc, &(0x7f0000002200)={&(0x7f00000021c0)={0x15, 0x0, 0x0, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) [ 723.297377][T15385] loop2: detected capacity change from 0 to 208 [ 723.387205][ T26] audit: type=1400 audit(1639309956.310:315): avc: denied { unmount } for pid=3631 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:device_t tclass=filesystem permissive=1 11:52:36 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000200)={[], [{@context={'context', 0x3d, 'root'}}]}) 11:52:36 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f00000000", 0x50, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:36 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=[{&(0x7f00000000c0)="d9", 0x1}], 0x0, 0x0) [ 723.601221][T15385] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 723.601221][T15385] 11:52:36 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000f00)={'tunl0\x00', &(0x7f0000000e00)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x29, 0x0, @dev, @initdev={0xac, 0x1e, 0x0, 0x0}}}}}) 11:52:36 executing program 4: socket$inet(0x2, 0x1, 0x800000) [ 723.686657][T15385] ERROR: (device loop2): remounting filesystem as read-only [ 723.694707][T15385] xtLookup: xtSearch returned -5 [ 723.756449][T15385] read_mapping_page failed! [ 723.761545][T15385] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 723.849666][T15385] Mount JFS Failure: -5 [ 723.867460][T15385] jfs_mount failed w/return code = -5 11:52:36 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab9810000000000000000"], 0x0) 11:52:36 executing program 0: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@local, @empty, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x2, 0x0, @remote, @multicast1}, @dest_unreach={0x11, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @remote, @empty}}}}}}, 0x0) 11:52:36 executing program 5: syz_open_procfs(0x0, &(0x7f0000000040)='attr/keycreate\x00') 11:52:36 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000100), 0x0, 0x0) syz_mount_image$fuse(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={{'fd', 0x3d, r0}, 0x2c, {'rootmode', 0x3d, 0x6000}, 0x2c, {}, 0x2c, {}, 0x2c, {[], [{@smackfshat={'smackfshat', 0x3d, 'msdos\x00'}}]}}) 11:52:36 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="14000000000000000100000002"], 0x18}, 0x0) [ 724.105520][T15410] fuse: Unknown parameter 'smackfshat' [ 724.129735][T15405] loop3: detected capacity change from 0 to 61456 11:52:37 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x5, &(0x7f0000002580)=[{&(0x7f0000000080)="ae", 0x1, 0x1}, {&(0x7f0000000180)='P', 0x1, 0x1ff}, {&(0x7f0000000280)="13", 0x1}, {&(0x7f0000000340)="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", 0xcc1}, {0x0}], 0x0, &(0x7f0000002740)) 11:52:37 executing program 5: r0 = socket$inet6_sctp(0x1c, 0x1, 0x84) readv(r0, &(0x7f0000000040)=[{&(0x7f0000000000)=""/30, 0x1e}], 0x1) 11:52:37 executing program 4: r0 = socket(0x2, 0x2, 0x0) bind$unix(r0, &(0x7f0000000000)=@abs={0x8}, 0x3) [ 724.392514][T15405] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 724.392514][T15405] [ 724.442281][T15405] ERROR: (device loop3): remounting filesystem as read-only [ 724.467054][T15416] loop2: detected capacity change from 0 to 208 [ 724.481139][T15405] xtLookup: xtSearch returned -5 [ 724.483931][T15424] loop0: detected capacity change from 0 to 6 [ 724.547648][T15405] read_mapping_page failed! [ 724.579662][T15405] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 724.619511][T15405] Mount JFS Failure: -5 [ 724.655342][T15405] jfs_mount failed w/return code = -5 11:52:37 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f00000000", 0x50, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:37 executing program 1: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000002040)={0x20, r0, 0xbdbef448db05960f, 0x0, 0x0, {{}, {@void, @val={0xc}}}}, 0x20}}, 0x0) 11:52:37 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x8, 0x0, &(0x7f0000004f40)=0x4) 11:52:37 executing program 5: write$UHID_DESTROY(0xffffffffffffffff, 0x0, 0x0) [ 724.749386][T15416] jfs_mount: diMount failed w/rc = -5 [ 724.762836][T15416] Mount JFS Failure: -5 [ 724.769479][T15416] jfs_mount failed w/return code = -5 11:52:37 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab9810000000000000000"], 0x0) 11:52:37 executing program 0: syz_open_dev$vcsu(&(0x7f0000000040), 0x40000, 0x301080) 11:52:37 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000002c40)='smaps\x00') ioctl$FIONREAD(r0, 0x541b, 0x0) 11:52:37 executing program 4: pselect6(0x40, &(0x7f0000001680), &(0x7f00000016c0)={0x9}, 0x0, 0x0, 0x0) 11:52:37 executing program 1: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmsg$nfc_llcp(r0, &(0x7f00000029c0)={&(0x7f00000012c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "d579ec7d0beb719706ccb9822f77041d7dd6f814af5a5a69b325b1202bfbdf7d3d178c1a51aaab06f490a23e0ae4dda4dc95a03e313d05ff81a8d42677d02a"}, 0x60, 0x0, 0x0, &(0x7f0000001980)={0x28, 0x0, 0x0, "d9e845074cf14f55aec37a8a332f8b9e27"}, 0x28}, 0x0) 11:52:37 executing program 0: syz_mount_image$msdos(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100), 0x0, &(0x7f0000000140)=ANY=[@ANYBLOB='trans=tcp,port=0x0000000000004e20,mmap,access=client,privport,']) 11:52:38 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x2, &(0x7f0000001480)=[{&(0x7f00000002c0)="bbd1810f4fb77dbc0ea44577663b95868f8c8ad905464e20394c8011f584575cd26974790712071ddf748078f7c3782bb6379d9108700c25f7e7dbbd76a89123ca3fcba2e336b6c46fa5d0fec6f31abf4df9e6d2b60c2d352f2168981a29e7b176bf03960e446f7e00310a4f8c20aec6d25376476fd6e3259426e8a16b2758812ccf2bb476d3215b39e36d3b299c2539b7f9bb4975dec1b7d38bd8237991cf11cc2fe37d6c3da52a594e5a23e188f4aad7f019d125c393a43229973e46ece865a16ff06a94931099d585a62250f52a8753", 0xd1, 0xeea}, {0x0, 0x0, 0x3f}], 0x0, &(0x7f0000001500)={[{@utf8no}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, '%:.,'}}, {@hash}, {@subj_role={'subj_role', 0x3d, '/.'}}, {@euid_eq={'euid', 0x3d, 0xee00}}, {@dont_appraise}]}) renameat(r0, &(0x7f0000001580)='./file0\x00', 0xffffffffffffffff, &(0x7f0000001700)='./file0\x00') setxattr$system_posix_acl(&(0x7f0000001fc0)='./file0\x00', 0x0, &(0x7f0000002040)={{}, {0x1, 0x2}, [{0x2, 0x0, 0xee00}], {}, [{0x8, 0x3, 0xee01}, {0x8, 0x0, 0xee01}]}, 0x3c, 0x1) lgetxattr(0x0, &(0x7f0000002540)=@random={'user.', 'clone_children'}, 0x0, 0x0) 11:52:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x3, &(0x7f0000001480)=[{&(0x7f00000002c0)="bb", 0x1, 0xeea}, {&(0x7f00000003c0)="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", 0xff5, 0x3f}, {&(0x7f00000013c0), 0x0, 0x81}], 0x0, &(0x7f0000001500)={[{@utf8no}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, '%:.,'}}, {@hash}, {@euid_eq={'euid', 0x3d, 0xee00}}]}) syz_mount_image$fuse(0x0, 0x0, 0x0, 0x0, 0x0, 0x2011400, 0x0) r0 = open(&(0x7f0000001740)='./file0\x00', 0x0, 0x0) setsockopt$IP6T_SO_SET_REPLACE(0xffffffffffffffff, 0x29, 0x40, &(0x7f0000001800)=@mangle={'mangle\x00', 0x1f, 0x6, 0x628, 0x0, 0x370, 0x210, 0x468, 0x210, 0x558, 0x558, 0x558, 0x558, 0x558, 0x6, 0x0, {[{{@ipv6={@dev={0xfe, 0x80, '\x00', 0xa}, @dev={0xfe, 0x80, '\x00', 0x35}, [0xffffffff, 0xffffff00, 0xff, 0xffffff00], [0xffffffff, 0x0, 0x0, 0xffffff00], 'wg1\x00', 'veth0_to_batadv\x00', {0xff}, {}, 0xff, 0xef, 0x2, 0x1}, 0x0, 0xa8, 0xd0}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@mcast2, @local, [0x0, 0xff000000], [0x0, 0xff000000, 0x0, 0xffffff00], 'ip6gretap0\x00', 'bond_slave_0\x00', {}, {}, 0x2c, 0x73, 0x4, 0x10}, 0x0, 0x118, 0x140, 0x0, {}, [@common=@dst={{0x48}, {0xd04, 0x4, 0x1, [0xfff, 0x92c, 0x7f, 0x9f19, 0xfff7, 0xffa6, 0xe994, 0x7, 0x5, 0x80, 0x8, 0x2, 0x200, 0x101, 0xf000, 0x3e8d], 0x5}}, @inet=@rpfilter={{0x28}, {0x2}}]}, @common=@unspec=@AUDIT={0x28, 'AUDIT\x00', 0x0, {0x1}}}, {{@ipv6={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, [0x0, 0xffffffff, 0xff000000], [0x0, 0xffffffff, 0xff000000], 'veth0_vlan\x00', 'veth1\x00', {}, {}, 0x0, 0x2, 0x7, 0x10}, 0x0, 0x138, 0x160, 0x0, {}, [@common=@srh1={{0x90}, {0x2c, 0x34, 0x3, 0xc1, 0x937, @private1, @rand_addr=' \x01\x00', @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', [0xff000000, 0x0, 0xff, 0xffffff00], [0xff, 0xffffffff, 0xffffffff, 0xff], [0xff, 0xffffffff, 0xff000000, 0xff000000], 0x141c, 0x800}}]}, @HL={0x28, 'HL\x00', 0x0, {0x3, 0x4}}}, {{@uncond, 0x0, 0xd0, 0xf8, 0x0, {}, [@inet=@rpfilter={{0x28}, {0x8}}]}, @unspec=@CHECKSUM={0x28}}, {{@ipv6={@rand_addr=' \x01\x00', @local, [0x0, 0x0, 0xff], [0xffffff00, 0x0, 0x0, 0xffffffff], 'ip_vti0\x00', 'lo\x00', {0xff}, {0xff}, 0x19f156d2df1b648a, 0x80, 0x0, 0x43}, 0x0, 0xa8, 0xf0}, @SNPT={0x48, 'SNPT\x00', 0x0, {@ipv6=@private1={0xfc, 0x1, '\x00', 0x1}, @ipv6=@remote, 0x32, 0x37, 0xc3be}}}], {{'\x00', 0x0, 0xa8, 0xd0}, {0x28}}}}, 0x688) sendmsg$AUDIT_MAKE_EQUIV(r0, &(0x7f0000001f80)={&(0x7f0000001ec0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000001f40)={&(0x7f0000001f00)={0x28, 0x3f7, 0x8, 0x70bd28, 0x25dfdbff, {0x7, 0x7, './file0', './file0'}, ["", "", "", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x80}, 0x20004890) setxattr$system_posix_acl(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)='system.posix_acl_access\x00', &(0x7f0000002040)={{}, {0x1, 0x2}, [{0x2, 0x1}, {0x2, 0x1, 0xee00}], {}, [{0x8, 0x3, 0xee01}, {0x8, 0xc, 0xffffffffffffffff}, {0x8, 0x1, 0xffffffffffffffff}, {0x8, 0x2, 0xee01}, {0x8, 0x2, 0xee01}], {0x10, 0xc}, {0x20, 0x4}}, 0x5c, 0x1) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f00000020c0)={0x1, {{0xa, 0x4e23, 0xb9, @private1={0xfc, 0x1, '\x00', 0x1}, 0x8000}}, 0x0, 0x7, [{{0xa, 0x4e20, 0x7ff, @private1, 0xffffffff}}, {{0xa, 0x4e21, 0xffff2db3, @ipv4={'\x00', '\xff\xff', @multicast1}, 0x361}}, {{0xa, 0x4e20, 0x2, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x8}}, {{0xa, 0x4e21, 0x1, @loopback, 0x48}}, {{0xa, 0x4e22, 0x80000000, @private1}}, {{0xa, 0x4e20, 0x941, @private2, 0x200}}, {{0xa, 0x4e23, 0x7481, @dev={0xfe, 0x80, '\x00', 0x16}, 0x7fff}}]}, 0x410) mount$cgroup2(0x0, &(0x7f0000004200)='./file1\x00', &(0x7f0000004240), 0x8420, &(0x7f00000043c0)={[{}], [{@appraise_type}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@permit_directio}, {@uid_gt}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}, {@subj_type={'subj_type', 0x3d, ',%!'}}, {@dont_measure}, {@appraise_type}, {@smackfshat={'smackfshat', 0x3d, 'fscontext'}}]}) [ 725.142360][ T26] audit: type=1400 audit(1639309958.060:316): avc: denied { write } for pid=15441 comm="syz-executor.1" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 725.256372][T15447] nf_conntrack: default automatic helper assignment has been turned off for security reasons and CT-based firewall rule not found. Use the iptables CT target to attach helpers instead. [ 725.292074][T15444] loop2: detected capacity change from 0 to 208 [ 725.309560][T15450] loop5: detected capacity change from 0 to 14 [ 725.334235][T15443] loop3: detected capacity change from 0 to 61456 [ 725.386620][T15450] FAT-fs (loop5): Unrecognized mount option "uid=00000000000000060928" or missing value [ 725.445684][T15453] loop4: detected capacity change from 0 to 14 [ 725.496042][T15453] FAT-fs (loop4): Unrecognized mount option "uid=00000000000000060928" or missing value [ 725.657450][T15444] jfs_mount: diMount failed w/rc = -5 [ 725.717865][T15444] Mount JFS Failure: -5 [ 725.761385][T15444] jfs_mount failed w/return code = -5 [ 726.042691][T15447] 9pnet: p9_fd_create_tcp (15447): problem connecting socket to 127.0.0.1 11:52:39 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f00000000", 0x50, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:39 executing program 5: r0 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r0, 0x107, 0xd, &(0x7f0000000680)=@req={0x0, 0x4}, 0x10) 11:52:39 executing program 1: pselect6(0x0, 0x0, 0x0, 0x0, &(0x7f0000000240), &(0x7f00000002c0)={&(0x7f0000000280), 0x8}) 11:52:39 executing program 4: fsopen(&(0x7f0000000080)='nfsd\x00', 0x0) 11:52:39 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab981000000000000000000"], 0x0) 11:52:39 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg$unix(r0, &(0x7f0000000580)=[{{&(0x7f0000000380), 0x0, &(0x7f0000000480)=[{&(0x7f0000000200)=""/134}, {&(0x7f00000002c0)=""/132}, {&(0x7f00000005c0)=""/252}], 0x0, &(0x7f00000004c0)=[@rights, @cred, @cred, @rights={{0x0, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred, @cred], 0xffffff4b}}], 0x400039c, 0x0, &(0x7f0000000800)={0x0, 0x989680}) [ 726.386266][T15465] loop2: detected capacity change from 0 to 208 11:52:39 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x3, &(0x7f0000000000)=@framed, &(0x7f0000000040)='GPL\x00', 0x5, 0xa7, &(0x7f0000000080)=""/167, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, &(0x7f0000000180), 0x8, 0x10, 0x0}, 0x78) 11:52:39 executing program 0: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockname(r0, 0x0, 0x0) 11:52:39 executing program 1: r0 = syz_open_dev$mouse(&(0x7f0000000040), 0x0, 0x0) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:52:39 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000002580)=[{&(0x7f0000000340)="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", 0xffd, 0x3}], 0x0, 0x0) [ 726.487636][T15465] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 726.487636][T15465] [ 726.569244][T15465] ERROR: (device loop2): remounting filesystem as read-only 11:52:39 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) [ 726.616422][T15465] xtLookup: xtSearch returned -5 [ 726.621501][T15465] read_mapping_page failed! [ 726.626104][T15465] jfs_mount: dbMount failed w/rc = -5 [ 726.655585][T15474] loop5: detected capacity change from 0 to 8 11:52:39 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x10022, 0x0, 0x0) [ 726.677898][T15467] loop3: detected capacity change from 0 to 61456 [ 726.711183][T15465] Mount JFS Failure: -5 [ 726.742218][T15465] jfs_mount failed w/return code = -5 11:52:40 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:40 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$unix(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="100000000000000001"], 0x38}, 0x0) 11:52:40 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$unix(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="10"], 0x38}, 0x0) 11:52:40 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000c40)='/proc/diskstats\x00', 0x0, 0x0) mknodat(r0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) 11:52:40 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab981000000000000000000"], 0x0) 11:52:40 executing program 5: r0 = socket$unix(0x1, 0x1, 0x0) sendmsg$sock(r0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=[@mark={{0x14}}], 0x18}, 0x0) 11:52:40 executing program 0: syz_mount_image$fuse(&(0x7f00000015c0), &(0x7f0000001600)='./file0\x00', 0x0, 0x0, 0x0, 0x2011400, &(0x7f0000001640)={{}, 0x2c, {}, 0x2c, {'user_id', 0x3d, 0xee00}}) 11:52:40 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000008ac0)={0x0, 0x0, &(0x7f0000008a80)={0x0}}, 0x0) write$binfmt_script(r0, &(0x7f0000001b00)={'#! ', './file0', [{}, {}, {0x20, '#('}, {0x20, '-,*#['}, {0x20, 'nnonumtail=1'}, {0x20, 'appraise_type=imasig'}, {}], 0xa, "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"}, 0x1039) [ 727.389333][T15487] loop2: detected capacity change from 0 to 208 [ 727.452373][T15495] loop3: detected capacity change from 0 to 61456 11:52:40 executing program 4: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) sendmsg$nfc_llcp(r0, &(0x7f00000029c0)={&(0x7f00000012c0)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "d579ec7d0beb719706ccb9822f77041d7dd6f814af5a5a69b325b1202bfbdf7d3d178c1a51aaab06f490a23e0ae4dda4dc95a03e313d05ff81a8d42677d02a"}, 0x60, 0x0, 0x0, &(0x7f0000001980)={0x10}, 0x10}, 0x0) 11:52:40 executing program 0: select(0x40, &(0x7f0000000040)={0x10001}, 0x0, 0x0, 0x0) 11:52:40 executing program 5: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) inotify_rm_watch(r0, 0x0) [ 727.505055][T15495] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 727.505055][T15495] [ 727.544987][T15495] ERROR: (device loop3): remounting filesystem as read-only [ 727.669033][T15487] jfs_mount: diMount failed w/rc = -5 [ 727.695249][T15487] Mount JFS Failure: -5 [ 727.707783][T15487] jfs_mount failed w/return code = -5 11:52:40 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000001a00)={0x0, 0x0, 0x0}, 0x0) [ 727.836293][T15495] xtLookup: xtSearch returned -5 [ 727.841451][T15495] read_mapping_page failed! [ 727.869785][T15495] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 727.897390][T15495] Mount JFS Failure: -5 [ 727.930563][T15495] jfs_mount failed w/return code = -5 11:52:41 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:41 executing program 4: bpf$MAP_CREATE(0x0, &(0x7f000000d100)={0x0, 0x0, 0x0, 0x0, 0x4, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x5}, 0x40) 11:52:41 executing program 5: syz_usb_connect(0x0, 0x24, &(0x7f0000000580)={{0x12, 0x1, 0x0, 0xf9, 0xde, 0x24, 0x40, 0xc26, 0x9, 0x4e57, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0xc2, 0x0, 0x0, 0x4a, 0x40, 0x57}}]}}]}}, 0x0) 11:52:41 executing program 0: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/route\x00') fstat(r0, &(0x7f0000000040)) 11:52:41 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab981000000000000000000"], 0x0) 11:52:41 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmmsg(r0, 0x0, 0x0, 0x0, &(0x7f0000002ec0)) 11:52:41 executing program 0: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x202d8e0, &(0x7f0000000240)) [ 728.373409][T15513] loop2: detected capacity change from 0 to 208 [ 728.527202][ T7] usb 6-1: new high-speed USB device number 3 using dummy_hcd [ 728.641656][T15518] loop3: detected capacity change from 0 to 61456 11:52:41 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="14"], 0x18}, 0x0) recvmsg$unix(r1, &(0x7f00000083c0)={0x0, 0x0, 0x0}, 0x22) 11:52:41 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000400)='./cgroup.net/syz1\x00', 0x200002, 0x0) [ 728.786506][T15513] jfs_mount: diMount failed w/rc = -5 [ 728.843564][T15513] Mount JFS Failure: -5 11:52:41 executing program 0: r0 = syz_init_net_socket$nfc_llcp(0x27, 0x2, 0x1) connect$nfc_llcp(r0, &(0x7f0000000340)={0x27, 0x0, 0x0, 0x0, 0x0, 0x0, "8cc37eb1d553cf9e6ee4657691843bb2944ac0c32a2134fbe1ff8dfde601296edce6df88cf6e2cb4a94ef9e24983005476c24c660db31cf40b9618cde9cdf9"}, 0x60) [ 728.871033][T15513] jfs_mount failed w/return code = -5 [ 728.886550][ T7] usb 6-1: config 0 has an invalid interface number: 194 but max is 0 [ 728.894762][ T7] usb 6-1: config 0 has no interface number 0 11:52:42 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab9810000000000000000"], 0x0) 11:52:42 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="14"], 0x18}, 0x0) recvmsg$unix(r1, &(0x7f0000001380)={&(0x7f0000000040), 0x6e, &(0x7f00000011c0)=[{&(0x7f00000000c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001200)}, 0x0) [ 729.147307][ T7] usb 6-1: New USB device found, idVendor=0c26, idProduct=0009, bcdDevice=4e.57 [ 729.177555][ T7] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 729.187369][ T7] usb 6-1: Product: syz [ 729.191563][ T7] usb 6-1: Manufacturer: syz [ 729.241195][ T7] usb 6-1: SerialNumber: syz [ 729.254860][ T26] audit: type=1400 audit(1639309962.170:317): avc: denied { connect } for pid=15529 comm="syz-executor.0" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=nfc_socket permissive=1 [ 729.273543][ T7] usb 6-1: config 0 descriptor?? [ 729.318247][ T7] ftdi_sio 6-1:0.194: FTDI USB Serial Device converter detected 11:52:42 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/120, 0x78, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:42 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r0, &(0x7f00000008c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x803e0000}, 0x0) [ 729.379628][T15535] loop2: detected capacity change from 0 to 208 [ 729.383971][ T7] usb 6-1: Detected FT-X [ 729.526519][ T7] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 729.546688][ T7] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 729.606581][ T7] ftdi_sio 6-1:0.194: GPIO initialisation failed: -71 [ 729.618399][T15535] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 729.618399][T15535] [ 729.642693][ T7] usb 6-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 729.657147][ T7] usb 6-1: USB disconnect, device number 3 [ 729.674577][ T7] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 729.715210][T15535] ERROR: (device loop2): remounting filesystem as read-only [ 729.768809][T15535] xtLookup: xtSearch returned -5 [ 729.792368][T15535] read_mapping_page failed! [ 729.800522][ T7] ftdi_sio 6-1:0.194: device disconnected [ 729.814277][T15535] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 729.857182][T15535] Mount JFS Failure: -5 [ 729.889190][T15535] jfs_mount failed w/return code = -5 11:52:43 executing program 5: perf_event_open$cgroup(&(0x7f00000003c0)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x5) 11:52:43 executing program 1: openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) 11:52:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, 0x0) 11:52:43 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000001380)) 11:52:43 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab9810000000000000000"], 0x0) [ 730.104655][T15540] loop3: detected capacity change from 0 to 61456 11:52:43 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="14"], 0x18}, 0x0) recvmsg$unix(r1, &(0x7f0000001380)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001200)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x18}, 0x0) ioctl$PERF_EVENT_IOC_QUERY_BPF(r2, 0xc008240a, 0x0) 11:52:43 executing program 0: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f0000000300)={&(0x7f00000001c0), 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x30, r0, 0xbdbef448db05960f, 0x0, 0x0, {{}, {@void, @void}}, [@NL80211_ATTR_REKEY_DATA={0x18, 0x7a, 0x0, 0x1, [@NL80211_REKEY_DATA_KCK={0x14, 0x2, @kck="5c6474a91286747d418895a1885ef4e9"}]}, @NL80211_ATTR_REKEY_DATA={0x4}]}, 0x30}}, 0x0) 11:52:43 executing program 1: pselect6(0x40, &(0x7f0000000000)={0xfffffffffffffff9}, 0x0, 0x0, &(0x7f00000000c0)={0x77359400}, 0x0) 11:52:43 executing program 5: statx(0xffffffffffffffff, &(0x7f0000000300)='./file0\x00', 0x0, 0x0, 0x0) [ 730.393131][T15549] loop2: detected capacity change from 0 to 208 [ 730.445872][T15540] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 730.445872][T15540] 11:52:43 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000001400)={0x6}, 0x4) [ 730.493511][T15540] ERROR: (device loop3): remounting filesystem as read-only [ 730.528146][T15540] xtLookup: xtSearch returned -5 [ 730.607415][T15540] read_mapping_page failed! [ 730.641709][T15540] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 730.696404][T15540] Mount JFS Failure: -5 [ 730.711613][T15540] jfs_mount failed w/return code = -5 [ 730.724388][T15549] ERROR: (device loop2): xtSearch: XT_GETPAGE: xtree page corrupt [ 730.724388][T15549] [ 730.782049][T15549] ERROR: (device loop2): remounting filesystem as read-only [ 730.810515][T15549] xtLookup: xtSearch returned -5 [ 730.816135][T15549] read_mapping_page failed! [ 730.821434][T15549] jfs_mount: dbMount failed w/rc = -5 [ 730.832293][T15549] Mount JFS Failure: -5 [ 730.838515][T15549] jfs_mount failed w/return code = -5 11:52:44 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000001000000", 0x8c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:44 executing program 0: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0), 0x0, 0x0) 11:52:44 executing program 1: add_key$keyring(&(0x7f0000000440), &(0x7f0000000480)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 11:52:44 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000000100)={'tunl0\x00', 0x0}) 11:52:44 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$sock(r1, &(0x7f00000008c0)={0x0, 0x0, 0x0}, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r0) 11:52:44 executing program 2: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpid() syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000", 0x2b, 0x8000}, {0x0}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b0000000020000000000000020000000000000001000000000000", 0x2f, 0xb200}, {&(0x7f0000011000)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000009", 0x2d, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100"/53, 0x35, 0xb400}, {&(0x7f0000011200)="0000000000000000000000000000000083000300120000000000000000000000000000000000000006000000100000", 0x2f, 0xb4e0}, {&(0x7f0000011400)}, {&(0x7f0000011500), 0x0, 0xb800}, {&(0x7f0000011700), 0x0, 0xd000}, {0x0}, {0x0}, {0x0}], 0x0, &(0x7f0000065600)) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0x0, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x0, 0x0, 0x8001, 0x0, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab9810000000000000000"], 0x0) 11:52:44 executing program 5: syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$system_posix_acl(&(0x7f0000001fc0)='./file0\x00', &(0x7f0000002000)='system.posix_acl_access\x00', &(0x7f0000002040)={{}, {}, [{}], {}, [{0x8, 0x0, 0xee01}, {0x8, 0x0, 0xffffffffffffffff}]}, 0x3c, 0x0) 11:52:44 executing program 1: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="14"], 0x18}, 0x0) 11:52:44 executing program 0: syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)={[{@utf8no}], [{@uid_eq={'uid', 0x3d, 0xee00}}, {@fsname={'fsname', 0x3d, '%:.,'}}]}) 11:52:44 executing program 5: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000001480), 0x0, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x4, &(0x7f0000003f40)=[{&(0x7f0000003b00)="99", 0x1}, {&(0x7f0000003bc0)="e2", 0x1}, {&(0x7f0000003c80)='7', 0x1}, {&(0x7f0000003d40)="1d", 0x1}], 0x0, 0x0) [ 731.942698][T15573] loop2: detected capacity change from 0 to 208 11:52:44 executing program 1: bpf$MAP_CREATE(0x0, &(0x7f0000000f40)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0, '\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x3}, 0x40) [ 732.135708][T15584] FAT-fs (loop0): Unrecognized mount option "uid=00000000000000060928" or missing value [ 732.188364][T15582] loop3: detected capacity change from 0 to 61456 [ 732.197968][T15573] read_mapping_page failed! [ 732.203225][T15573] jfs_mount: diMount(ipaimap) failed w/rc = -5 [ 732.221479][T15573] Mount JFS Failure: -5 11:52:45 executing program 0: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x1, &(0x7f0000000000)=@raw=[@alu], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, &(0x7f00000000c0), 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 732.241348][T15573] jfs_mount failed w/return code = -5 [ 732.518177][T15582] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 732.518177][T15582] [ 732.590111][T15582] ERROR: (device loop3): remounting filesystem as read-only [ 732.676727][T15582] xtLookup: xtSearch returned -5 [ 732.686757][T15582] read_mapping_page failed! [ 732.724938][T15582] jfs_mount: diMount failed w/rc = -5 [ 732.744236][T15582] Mount JFS Failure: -5 [ 732.755156][T15582] jfs_mount failed w/return code = -5 11:52:45 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000001000000", 0x8c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:45 executing program 5: r0 = socket$key(0xf, 0x3, 0x2) write$binfmt_script(r0, 0x0, 0x38) 11:52:45 executing program 4: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NBD_CMD_STATUS(r0, &(0x7f0000001e40)={&(0x7f0000001d40)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001e00)={&(0x7f0000001dc0)={0x14}, 0x14}}, 0x0) 11:52:45 executing program 1: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="14"], 0x18}, 0x11) 11:52:45 executing program 0: syz_read_part_table(0x7fffffff, 0x0, 0x0) 11:52:45 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="14"], 0x28}, 0x0) [ 732.995241][T15598] loop0: detected capacity change from 0 to 264192 11:52:45 executing program 1: clock_gettime(0x0, &(0x7f0000000180)) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl802154(0x0, 0xffffffffffffffff) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000140)={0x3dd}, 0x0) 11:52:46 executing program 5: nanosleep(&(0x7f0000003240)={0x77359400}, 0x0) 11:52:46 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) recvmsg$unix(r1, &(0x7f00000083c0)={0x0, 0x0, 0x0}, 0x22) 11:52:46 executing program 2: syz_open_procfs(0x0, &(0x7f00000000c0)='net/dev_mcast\x00') 11:52:46 executing program 0: syz_read_part_table(0x7fffffff, 0x0, 0x0) 11:52:46 executing program 2: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x40000800, &(0x7f0000000200), 0x202d8c1, &(0x7f0000000240)) [ 733.389227][T15606] loop3: detected capacity change from 0 to 61456 [ 733.553953][T15615] loop0: detected capacity change from 0 to 264192 11:52:46 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000000000000000000001000000", 0x8c, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:46 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_DEL_PMK(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={0x0, 0x64}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) 11:52:46 executing program 0: syz_read_part_table(0x7fffffff, 0x0, 0x0) 11:52:47 executing program 1: syz_usb_connect(0x0, 0x24, &(0x7f0000000580)={{0x12, 0x1, 0x0, 0xf9, 0xde, 0x24, 0x40, 0xc26, 0x9, 0x4e57, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x4a, 0x40, 0x57}}]}}]}}, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x3, [{0x4, &(0x7f0000000700)=@lang_id={0x4}}, {0x4, &(0x7f0000000740)=@lang_id={0x4, 0x3, 0x42f}}, {0x50, &(0x7f00000007c0)=@string={0x50, 0x3, "b105b63e7dc50ad7146ec71e09abe157d5f0e5d76e245b9125c07f53d8d950dd655aaa666275889714312d15011f85afcf27975a339055ca3030aea0aa524a47eccef2bd08b6c906b326c97333db"}}]}) 11:52:47 executing program 5: clock_gettime(0x0, &(0x7f0000000000)) sched_rr_get_interval(0x0, &(0x7f0000000040)) [ 734.151049][T15620] loop0: detected capacity change from 0 to 264192 11:52:47 executing program 4: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="14000000000000000100000001"], 0x18}, 0x0) 11:52:47 executing program 0: syz_read_part_table(0x7fffffff, 0x0, 0x0) [ 734.331847][T15624] loop3: detected capacity change from 0 to 61456 11:52:47 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='journal_async_commit,lazytime,journal_ioprio=0x0000000000000000,jqfmt=vfsv1,oldalloc,', @ANYBLOB]) 11:52:47 executing program 4: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f00000003c0)=[{&(0x7f0000000300)="8d9e22f3060a0d0569db", 0xa, 0xfffffffffffffff7}], 0x0, 0x0) 11:52:47 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_GET_SEC_LEVEL(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[], 0x40}}, 0x0) [ 734.536388][ T7] usb 2-1: new high-speed USB device number 14 using dummy_hcd [ 734.606188][T15634] loop0: detected capacity change from 0 to 264192 [ 734.624309][T15633] loop5: detected capacity change from 0 to 127 [ 734.635904][T15624] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 734.635904][T15624] [ 734.652394][T15635] loop4: detected capacity change from 0 to 16383 [ 734.668642][T15633] EXT4-fs (loop5): VFS: Can't find ext4 filesystem [ 734.675711][T15624] ERROR: (device loop3): remounting filesystem as read-only [ 734.693159][T15624] xtLookup: xtSearch returned -5 [ 734.736801][T15624] read_mapping_page failed! [ 734.755816][T15624] jfs_mount: diMount(ipaimap2) failed, rc = -5 11:52:47 executing program 4: mount$cgroup(0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)) [ 734.817024][T15624] Mount JFS Failure: -5 11:52:47 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000200)={0x18, 0x4, &(0x7f0000000000)=@framed={{}, [@func={0x85, 0x0, 0x1, 0x0, 0x7}]}, &(0x7f0000000040)='GPL\x00', 0x5, 0xa7, &(0x7f0000000080)=""/167, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) [ 734.837410][T15624] jfs_mount failed w/return code = -5 11:52:48 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000008ac0)={0x0, 0x0, &(0x7f0000008a80)={0x0}}, 0x0) sendmsg$SMC_PNETID_GET(r0, &(0x7f0000002d00)={&(0x7f0000002c00)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000002cc0)={0x0}}, 0x0) 11:52:48 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000002500)='./file0\x00', &(0x7f0000002540)=@random={'user.', 'clone_children'}, &(0x7f0000002580)=""/140, 0x8c) 11:52:48 executing program 5: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000000)='cpuacct.usage_percpu\x00', 0x0, 0x0) [ 735.066411][ T7] usb 2-1: New USB device found, idVendor=0c26, idProduct=0009, bcdDevice=4e.57 [ 735.075492][ T7] usb 2-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 735.126454][ T7] usb 2-1: Product: ֱ㺶약휊渔ệꬉ埡ퟥ⑮酛쀥卿򆅐婥暪畢鞈ㄔᔭἁ꾅⟏媗逳쩕〰ꂮ努䝊컬뷲똈ۉ⚳珉 [ 735.181691][ T7] usb 2-1: Manufacturer: Я [ 735.193572][ T7] usb 2-1: SerialNumber: syz [ 735.216850][ T7] usb 2-1: config 0 descriptor?? [ 735.257749][ T7] ftdi_sio 2-1:0.0: FTDI USB Serial Device converter detected [ 735.316971][ T7] usb 2-1: Detected FT-X [ 735.476347][ T7] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 735.496343][ T7] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 735.519675][ T7] ftdi_sio 2-1:0.0: GPIO initialisation failed: -71 [ 735.568655][ T7] usb 2-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 735.617536][ T7] usb 2-1: USB disconnect, device number 14 [ 735.628633][ T7] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 735.646758][ T7] ftdi_sio 2-1:0.0: device disconnected 11:52:48 executing program 1: bind$nfc_llcp(0xffffffffffffffff, 0x0, 0x0) 11:52:48 executing program 4: r0 = socket$inet6(0xa, 0x3, 0x6) getsockopt$inet6_mreq(r0, 0x29, 0x0, 0x0, 0x0) 11:52:48 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/150, 0x96, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:48 executing program 2: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000000080)={&(0x7f0000000000)='br_fdb_external_learn_add\x00'}, 0x10) 11:52:48 executing program 0: pselect6(0x40, &(0x7f0000001680), 0x0, 0x0, 0x0, &(0x7f00000017c0)={0x0}) 11:52:48 executing program 5: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, &(0x7f0000000200), 0x202d8c1, &(0x7f0000000240)) 11:52:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x4, &(0x7f0000002580)=[{&(0x7f0000000080)="ae7367ad0470c7b123f5fe82453af6f5e630e2d7f7fd42c721fb11e5fd1d1bbf503cf6c85e07493f7d04f186ba5dc56a4854038ffbd659b3f0f3c057617cdd6e6bcfdae5d027043c6133cf1401e3c5082d7dd86ab52ffc27e709882c85f0f22505f6ac86fc6c871138d6e93680ab7cb56ccf17a68c0512daa3ebd2faec75ecbccc0a0c9fd37aa5034f48fef1031716e2399760b1ed35bcd0c6c3904d0b59320d3fd45014b33d44a90fbf17c17cc62a94b6aa6507041a798a1c2f5e6c38ececc9489ec3b7fdb22a92458a", 0xca, 0x1}, {&(0x7f0000000180)="5099", 0x2, 0x1ff}, {0x0}, {&(0x7f0000000340)="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", 0xcc1, 0x3}], 0x0, &(0x7f0000002740)={[{@auto_da_alloc_val={'auto_da_alloc', 0x3d, 0x10001}}, {@max_batch_time}, {@delalloc}, {@dax}], [{@subj_type={'subj_type', 0x3d, '&%'}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@smackfshat={'smackfshat', 0x3d, '#'}}, {@smackfshat={'smackfshat', 0x3d, '&N-\'\''}}, {@fowner_eq}, {@obj_user={'obj_user', 0x3d, ']\''}}]}) 11:52:49 executing program 2: bpf$MAP_CREATE(0x0, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0xc}, 0x40) 11:52:49 executing program 5: syz_mount_image$vfat(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$tmpfs(0x0, &(0x7f0000000100)='./file0\x00', &(0x7f0000000140), 0x0, 0x0) 11:52:49 executing program 1: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0xa, &(0x7f0000000000)=@raw=[@alu, @alu, @generic, @alu, @initr0, @jmp, @alu, @btf_id], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:52:49 executing program 2: syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0xe000000, &(0x7f0000000200), 0x0, &(0x7f0000000240)) [ 736.340970][T15661] loop4: detected capacity change from 0 to 6 11:52:49 executing program 5: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0xb, &(0x7f0000000000)=@raw=[@alu, @alu, @generic, @alu, @initr0, @jmp, @btf_id, @map_val], &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:52:49 executing program 4: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_icmp_ICMP_FILTER(r0, 0x1, 0x1, &(0x7f0000001400), 0x4) 11:52:49 executing program 1: syz_open_dev$vcsu(&(0x7f0000000040), 0x0, 0x301080) [ 736.980495][T15676] loop3: detected capacity change from 0 to 61456 [ 737.055953][T15676] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 737.055953][T15676] [ 737.086127][T15676] ERROR: (device loop3): remounting filesystem as read-only [ 737.094260][T15676] xtLookup: xtSearch returned -5 [ 737.116208][T15676] read_mapping_page failed! [ 737.120765][T15676] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 737.136500][T15676] Mount JFS Failure: -5 [ 737.140675][T15676] jfs_mount failed w/return code = -5 11:52:50 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/150, 0x96, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:50 executing program 5: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f0000002100)={0x1, @link_key_neg_reply={{0x40c, 0x6}, {@fixed}}}, 0xa) 11:52:50 executing program 4: syz_open_dev$vcsu(&(0x7f00000000c0), 0x0, 0x400080) 11:52:50 executing program 1: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x0, &(0x7f0000001380), 0x0, &(0x7f0000001540)={[{@utf8}], [{@measure}, {@dont_hash}]}) 11:52:50 executing program 0: socket$inet_udp(0x2, 0x2, 0x0) syz_open_dev$vcsu(0x0, 0x0, 0x0) openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000500)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) [ 737.521809][T15682] FAT-fs (loop1): Unrecognized mount option "measure" or missing value 11:52:50 executing program 2: add_key$fscrypt_v1(&(0x7f0000000100), 0x0, &(0x7f0000000180)={0x0, "cab3c95bf419296f214b88dca5eb26df1ce914f096ac3e6dc16e82649467bcb93109798f86b217e64cb1df16a0a2bb9bafdf775d9ad7ba0357873a4a0e24fd69"}, 0x48, 0xfffffffffffffffb) [ 737.548450][ T26] audit: type=1400 audit(1639309970.470:318): avc: denied { write } for pid=15680 comm="syz-executor.5" path="socket:[62649]" dev="sockfs" ino=62649 scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=bluetooth_socket permissive=1 11:52:50 executing program 0: write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x0, 0x0, &(0x7f0000001480), 0x0, &(0x7f0000001500)={[], [{@subj_role={'subj_role', 0x3d, '/.'}}, {@dont_appraise}]}) 11:52:50 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) getsockname(r0, &(0x7f0000005040)=@nl, &(0x7f00000050c0)=0x80) 11:52:50 executing program 5: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000009700)='./file0\x00', 0x641, 0x0) write$FUSE_POLL(r0, &(0x7f0000000140)={0x18}, 0x18) 11:52:50 executing program 1: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x2, &(0x7f0000002580)=[{&(0x7f0000000340)="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", 0xffe, 0x3}, {0x0, 0x0, 0xd19}], 0x0, 0x0) 11:52:50 executing program 2: socketpair(0x2, 0x3, 0x0, &(0x7f0000001280)) [ 737.775362][T15694] loop1: detected capacity change from 0 to 13 [ 737.807456][T15693] FAT-fs (loop0): Unrecognized mount option "subj_role=/." or missing value 11:52:50 executing program 4: clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) select(0x40, &(0x7f0000000040), &(0x7f0000000080)={0x1}, &(0x7f00000000c0)={0x10001}, &(0x7f0000000140)={0x0, r0/1000+10000}) [ 737.824139][T15687] loop3: detected capacity change from 0 to 61456 11:52:51 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/150, 0x96, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:51 executing program 5: keyctl$KEYCTL_MOVE(0x1e, 0x0, 0x0, 0xfffffffffffffffb, 0x0) 11:52:51 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000940)='tmpfs\x00', 0x0, 0x0) chdir(&(0x7f0000000380)='./file0\x00') mkdir(&(0x7f0000000180)='./file0\x00', 0x0) lchown(&(0x7f0000000140)='./file0\x00', 0xee00, 0xffffffffffffffff) rename(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)='./file1\x00') 11:52:51 executing program 1: syz_open_dev$mouse(&(0x7f0000000040), 0x0, 0x490602) 11:52:51 executing program 4: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x1, &(0x7f0000002580)=[{&(0x7f0000000080)="ae73", 0x2, 0x1}], 0x0, 0x0) 11:52:51 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_ipv4_tunnel_SIOCCHGTUNNEL(r0, 0x89f3, &(0x7f0000004d00)={'ip_vti0\x00', &(0x7f0000004b80)={'erspan0\x00', 0x0, 0x0, 0x0, 0x0, 0x0, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x0, 0x0, @loopback, @broadcast}}}}) 11:52:51 executing program 4: socket$inet(0x2, 0xa, 0x0) socket$inet(0x2, 0xa, 0x0) 11:52:51 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) recvmsg(r0, &(0x7f0000002b40)={0x0, 0x0, &(0x7f0000002a40)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {0x0}], 0x9}, 0xc596009f568e2ec0) 11:52:51 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) recvmsg(r0, &(0x7f0000001a00)={&(0x7f0000000440)=@in6={0xa, 0x0, 0x0, @private2}, 0x80, &(0x7f0000001980)=[{0x0}, {0x0}], 0x2}, 0x2041) 11:52:51 executing program 5: r0 = getpgid(0x0) r1 = socket$unix(0x1, 0x1, 0x0) sendmsg$unix(r1, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000380)=[@cred={{0x1c, 0x1, 0x2, {r0, 0xee00}}}, @cred={{0x1c, 0x1, 0x2, {r0}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x0) 11:52:51 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=ANY=[], 0x18}, 0x0) [ 738.883170][T15721] loop3: detected capacity change from 0 to 61456 11:52:51 executing program 5: syz_usb_connect(0x0, 0x24, &(0x7f0000000580)={{0x12, 0x1, 0x0, 0xf9, 0xde, 0x24, 0x40, 0xc26, 0x9, 0x4e57, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0x4a, 0x40, 0x57}}]}}]}}, &(0x7f0000000b80)={0x0, 0x0, 0x0, 0x0, 0x2, [{0x4, &(0x7f0000000700)=@lang_id={0x4}}, {0x22, &(0x7f00000007c0)=@string={0x22, 0x3, "b105b63e7dc50ad7146ec71e09abe157d5f0e5d76e245b9125c07f53d8d950dd"}}]}) 11:52:52 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/155, 0x9b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:52 executing program 2: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f00000022c0), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r0, 0x8004e500, &(0x7f0000002300)) 11:52:52 executing program 4: socketpair(0x2, 0x3, 0x8, &(0x7f0000001280)) 11:52:52 executing program 1: bpf$BPF_RAW_TRACEPOINT_OPEN(0x11, &(0x7f0000012e40)={&(0x7f0000012e00)='timer_expire_entry\x00'}, 0x10) 11:52:52 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) recvmmsg$unix(r0, &(0x7f00000004c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 11:52:52 executing program 1: syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lgetxattr(&(0x7f0000002500)='./file0\x00', 0x0, 0x0, 0x0) 11:52:52 executing program 0: syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f00000001c0)=[{&(0x7f0000000080)='U', 0x1}, {&(0x7f00000000c0)="d9", 0x1}], 0x0, 0x0) 11:52:52 executing program 4: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = getpgid(0x0) sendmmsg$unix(r0, &(0x7f0000000cc0)=[{{0x0, 0x0, 0x0, 0x0, &(0x7f0000000c00)=[@cred={{0x1c, 0x1, 0x2, {r1, 0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [r0]}}], 0x38}}], 0x1, 0x0) 11:52:52 executing program 2: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, 0x0, 0x18}, 0x0) [ 739.217683][ T26] audit: type=1400 audit(1639309972.140:319): avc: denied { ioctl } for pid=15729 comm="syz-executor.2" path="/dev/fuse" dev="devtmpfs" ino=97 ioctlcmd=0xe500 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:fuse_device_t tclass=chr_file permissive=1 11:52:52 executing program 2: r0 = syz_open_dev$vcsu(&(0x7f0000000000), 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x0, 0x10, r0, 0x0) [ 739.406611][ T7] usb 6-1: new high-speed USB device number 4 using dummy_hcd 11:52:52 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000008ac0)={0x0, 0x0, &(0x7f0000008a80)={0x0}}, 0x0) write$binfmt_script(r0, &(0x7f0000001b00)={'#! ', './file0', [], 0xa, "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"}, 0xeed) [ 739.579188][T15749] loop3: detected capacity change from 0 to 61456 [ 739.929954][ T7] usb 6-1: New USB device found, idVendor=0c26, idProduct=0009, bcdDevice=4e.57 [ 739.973753][ T7] usb 6-1: New USB device strings: Mfr=1, Product=2, SerialNumber=3 [ 740.012323][ T7] usb 6-1: Product: syz [ 740.024596][ T7] usb 6-1: Manufacturer: ֱ㺶약휊渔ệꬉ埡ퟥ⑮酛쀥卿򆅐 [ 740.073408][ T7] usb 6-1: SerialNumber: syz [ 740.102063][ T7] usb 6-1: config 0 descriptor?? [ 740.162784][ T7] ftdi_sio 6-1:0.0: FTDI USB Serial Device converter detected [ 740.189854][ T7] usb 6-1: Detected FT-X [ 740.366440][ T7] ftdi_sio ttyUSB0: Unable to read latency timer: -71 [ 740.386317][ T7] ftdi_sio ttyUSB0: Unable to write latency timer: -71 [ 740.426394][ T7] ftdi_sio 6-1:0.0: GPIO initialisation failed: -71 [ 740.454545][ T7] usb 6-1: FTDI USB Serial Device converter now attached to ttyUSB0 [ 740.482852][ T7] usb 6-1: USB disconnect, device number 4 [ 740.524442][ T7] ftdi_sio ttyUSB0: FTDI USB Serial Device converter now disconnected from ttyUSB0 [ 740.554748][ T7] ftdi_sio 6-1:0.0: device disconnected 11:52:53 executing program 5: openat$ppp(0xffffffffffffff9c, &(0x7f0000000080), 0xc080, 0x0) 11:52:53 executing program 1: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000500), 0x202, 0x0) write$P9_RREADDIR(r0, 0x0, 0x0) 11:52:53 executing program 4: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0xa, &(0x7f0000000000)=@raw=[@alu, @alu, @generic, @alu, @initr0, @jmp, @alu, @map_val], &(0x7f0000000080)='GPL\x00', 0x7, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:52:53 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$DEVLINK_CMD_TRAP_GROUP_GET(r1, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={0x0}}, 0x0) sendmsg$TEAM_CMD_OPTIONS_SET(r0, &(0x7f0000001dc0)={0x0, 0x0, &(0x7f0000001d80)={0x0}}, 0x0) 11:52:53 executing program 0: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg$unix(r1, &(0x7f0000000240)={0x0, 0x0, 0x0}, 0x0) sendmsg$unix(r0, &(0x7f0000001480)={0x0, 0x0, 0x0, 0x0, &(0x7f0000001440)=ANY=[@ANYBLOB="14"], 0x18}, 0x0) 11:52:53 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/155, 0x9b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:54 executing program 2: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/netfilter\x00') 11:52:54 executing program 1: bpf$BPF_BTF_GET_FD_BY_ID(0x13, &(0x7f0000000240)=0xffffffffffffffff, 0x4) 11:52:54 executing program 4: getsockopt$nfc_llcp(0xffffffffffffffff, 0x118, 0x0, 0x0, 0x0) 11:52:54 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_id(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700), 0x0, 0x0, 0x0) [ 741.163203][T15760] loop3: detected capacity change from 0 to 61456 11:52:54 executing program 4: select(0x40, &(0x7f0000000000), 0x0, &(0x7f0000000080)={0x6}, &(0x7f0000000100)={0x0, 0xea60}) 11:52:54 executing program 1: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00'}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x3c, 0x0, 0x400, 0x70bd28, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x3c}, 0x1, 0x0, 0x0, 0x20044085}, 0x0) syz_read_part_table(0x0, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000200)="a6609ca51db7f2d59b3bbffac1c86d391fb42d2e191e365fe0318a5f30725dd15ed932c66e697b57286e2de384798ecb29e5c70e03946d55877ecf", 0x3b, 0x7}, {&(0x7f0000000240)="4d7a55bf595a755ffaf2954069e5c619bb7cda92277ac108037d7c4aeecd944ea7928f4ee87e89834c884ed8a9dec818", 0x30, 0x7}, {&(0x7f0000000340)}]) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, 0x0) 11:52:54 executing program 5: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r1 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_REKEY_OFFLOAD(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000240)=ANY=[@ANYBLOB='(\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="0f9628bd7000000000004f0000000c"], 0x28}}, 0x0) 11:52:54 executing program 2: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000040)={'wpan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000000c0)={'wpan1\x00', 0x0}) sendmsg$NL802154_CMD_GET_SEC_DEVKEY(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000100)={0x74, 0x0, 0x400, 0x70bd28, 0x25dfdbff, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r0}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r1}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8}]}, 0x74}, 0x1, 0x0, 0x0, 0x20044085}, 0x800) syz_read_part_table(0x7fffffff, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000200)="a6609ca51db7f2d59b3bbffac1c86d391fb42d2e191e365fe0318a5f30725dd15ed932c66e697b57286e2de384798ecb29e5c70e03946d55877ecf", 0x3b, 0x7}, {&(0x7f0000000240)="4d7a55bf595a755ffaf2954069e5c619bb7cda92277ac108037d7c4aeecd944ea7928f4ee87e89834c884ed8a9dec818954c4e049a34b058ff95f3417edcfbe00ee84341cc4e2984e7155506d72749bac8211eb6bdca6606f7f7aef433611218fd5b76a196fc720c58ee0264658886b3251f08d1467c865bd46f6dd511ae2b381afd00f502347e4c57bc3b5a9bbae1355c32700158009628b07cb648f1f604f378781946ae6c3999f2e77302afee1fc0d702b75b442dc8fecc19a682986a4607fca6b9550023c6a9d4ebc55a11f4e2871780530d51ab9682a0c9cdc58b0341", 0xdf, 0x7}, {&(0x7f0000000340)="685d0e0c5e90978fcfb8ada8d3d91a26d3c25e9f736d1d9a147e91fbf7567a0179f94b582c4a7da5e2a3024a3415ae49a2030fbccda786805931701d82c47275ab135953c401dadb0c2e5ab735ee2d5ab3ca", 0x52, 0x3ff}]) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, 0x0, &(0x7f0000004f40)) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000001e40)={&(0x7f0000001d40)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000001e00)={&(0x7f0000001dc0)={0x14}, 0x14}}, 0x0) 11:52:54 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_id(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700), 0x0, 0x0, 0x0) [ 741.428917][T15760] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 741.428917][T15760] [ 741.454344][T15778] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.5'. [ 741.454746][T15779] loop2: detected capacity change from 0 to 264192 11:52:54 executing program 4: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f00000022c0), 0x2, 0x0) ioctl$FUSE_DEV_IOC_CLONE(r1, 0x8004e500, &(0x7f0000002300)=r0) 11:52:54 executing program 5: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000d00), 0x141100, 0x0) [ 741.479167][T15760] ERROR: (device loop3): remounting filesystem as read-only [ 741.516623][T15760] xtLookup: xtSearch returned -5 [ 741.536398][T15760] read_mapping_page failed! [ 741.547234][T15760] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 741.644547][T15760] Mount JFS Failure: -5 [ 741.664737][T15760] jfs_mount failed w/return code = -5 11:52:54 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/155, 0x9b, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:54 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_id(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700), 0x0, 0x0, 0x0) 11:52:54 executing program 2: bpf$BPF_PROG_RAW_TRACEPOINT_LOAD(0x5, &(0x7f0000000180)={0x18, 0x7, &(0x7f0000000000)=@raw=[@alu, @alu, @generic, @alu, @initr0, @jmp], &(0x7f0000000080)='GPL\x00', 0x0, 0x0, 0x0, 0x0, 0x0, '\x00', 0x0, 0x0, 0xffffffffffffffff, 0x8, 0x0, 0x0, 0x10, 0x0}, 0x78) 11:52:54 executing program 1: socketpair(0x2, 0x5, 0x0, &(0x7f00000008c0)) 11:52:54 executing program 4: socket$inet(0x2, 0x6, 0xb7a) 11:52:54 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='journal_async_commit,lazytime,jo', @ANYBLOB=',smackfsdef=,donu_appraise,obj_role=+*-\ffunc=POLICY_CHECK,']) fsmount(0xffffffffffffffff, 0x0, 0x1) 11:52:54 executing program 0: syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) setxattr$incfs_id(&(0x7f00000026c0)='./file0\x00', &(0x7f0000002700), 0x0, 0x0, 0x0) 11:52:54 executing program 1: syz_mount_image$fuse(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_tcp(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)={'trans=tcp,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@uname={'uname', 0x3d, '-}+,-,*'}}], [{@fsuuid}]}}) 11:52:54 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x6, 0x0, &(0x7f0000004f40)) 11:52:54 executing program 4: getsockname(0xffffffffffffffff, 0x0, &(0x7f0000000080)) clock_gettime(0x4, &(0x7f0000000540)) [ 741.962793][ T26] audit: type=1400 audit(1639309974.880:320): avc: denied { create } for pid=15798 comm="syz-executor.4" scontext=root:sysadm_r:sysadm_t tcontext=root:sysadm_r:sysadm_t tclass=dccp_socket permissive=1 [ 741.978908][T15801] loop5: detected capacity change from 0 to 127 [ 742.044065][T15801] EXT4-fs (loop5): VFS: Can't find ext4 filesystem 11:52:55 executing program 0: r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000004440), 0x2, 0x0) read$FUSE(r0, 0x0, 0x0) 11:52:55 executing program 4: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0xffff, 0x0, &(0x7f00000001c0), 0x0, &(0x7f0000000200)=ANY=[@ANYBLOB='journal_async_commit,lazytime,journal_ioprio=0x0000000000000000,jqfmt=vfsv1,oldal', @ANYRESDEC=0x0]) fsmount(0xffffffffffffffff, 0x0, 0x0) [ 742.232125][T15811] 9pnet: p9_fd_create_tcp (15811): problem connecting socket to 127.0.0.1 [ 742.453711][T15815] loop4: detected capacity change from 0 to 127 [ 742.490525][ T3720] I/O error, dev loop4, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 1 prio class 0 [ 742.556933][T15815] EXT4-fs (loop4): VFS: Can't find ext4 filesystem [ 742.747308][T15817] loop3: detected capacity change from 0 to 61456 [ 742.978485][T15817] ERROR: (device loop3): xtSearch: XT_GETPAGE: xtree page corrupt [ 742.978485][T15817] [ 743.008735][T15817] ERROR: (device loop3): remounting filesystem as read-only [ 743.046604][T15817] xtLookup: xtSearch returned -5 [ 743.058984][T15817] read_mapping_page failed! [ 743.064362][T15817] jfs_mount: diMount(ipaimap2) failed, rc = -5 [ 743.081798][T15817] Mount JFS Failure: -5 [ 743.152732][T15817] jfs_mount failed w/return code = -5 11:52:56 executing program 3: perf_event_open(&(0x7f0000000880)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x49c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = getpid() sched_setscheduler(r0, 0x5, &(0x7f0000000380)) r1 = syz_open_procfs(r0, &(0x7f0000000000)='net/rt_cache\x00') readv(r1, &(0x7f0000000440)=[{&(0x7f00000003c0)=""/113, 0x71}, {&(0x7f0000000080)=""/34, 0x22}], 0x2) syz_emit_ethernet(0x0, 0x0, 0x0) syz_extract_tcp_res(0x0, 0x0, 0x6) syz_mount_image$jfs(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x11, &(0x7f0000000200)=[{&(0x7f0000010000)="4a465331010000006076000000000000001000000c00030000020000090000000020000000092010000000000000000004000000180000000200000016000000330700000100000000010000000f000034000000cc0e00", 0x57, 0x8000}, {&(0x7f0000010100)="ffffffff01000000200000001a0000000400", 0x12, 0x9000}, {0x0}, {&(0x7f0000010e00)="00000000000000000100"/32, 0x20, 0xb020}, {&(0x7f0000010f00)="10c4645f010000000100000001000000040000000b000000002000000000000002000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f000000000000000000000000000000000000000000000000000000000000000000000000020000000000000000000000000000000100"/157, 0x9d, 0xb200}, {&(0x7f0000011000)="00000000000000000000000000000000830003001200000000000000000000000000000000000000020000000900"/64, 0x40, 0xb2e0}, {&(0x7f0000011100)="10c4645f010000000200000001000000040000000b000000006000000000000006000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/118, 0x76, 0xb400}, {&(0x7f0000011200)="00000000000000000000000000000000830003001200000000000000000000000000000000000000060000001000"/64, 0x40, 0xb4e0}, {&(0x7f0000011300)="10c4645f010000000300000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080010010c4645f0000000010c4645f0000000010c4645f0000000010c4645f0000000000000000000000000000000000000000000000000000000000000000000000000200000000000000", 0x80, 0xb600}, {&(0x7f0000011400)="00000000000000000000000000000000830002001200"/32, 0x20, 0xb6e0}, {&(0x7f0000011500)="10c4645f010000000400000001000000040000000b000000000000000000000000000000000000000100000000000000000000000080030010c4645f0000000010c4645f0000000010c4645f0000000010c4645f00"/112, 0x70, 0xb800}, {&(0x7f0000011700)="10c4645f010000001000000001000000040000000b000000002000000000000002000000000000000100"/53, 0x35, 0xd000}, {&(0x7f0000011800)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000020", 0x2d, 0xd0e0}, {&(0x7f0000013900)="10c4645f01000000010000000100000004000000180000000020", 0x1a, 0x18200}, {&(0x7f0000013a00)="000000000000000000000000000000008300030012000000000000000000000000000000000000000200000016", 0x2d, 0x182e0}, {&(0x7f0000015e00)="04", 0x1, 0x21c00}, {&(0x7f0000018900)="21436587010000000100000000010000001000000c0000000009201001", 0x1d, 0xf01000}], 0x0, &(0x7f0000065600)) close(0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x9, 0xca, 0x0, 0x6, 0x0, 0x0, 0xd0401, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x8000, 0x4, @perf_bp={&(0x7f00000001c0), 0x9}, 0x800, 0x0, 0x8001, 0x9, 0x1, 0x200, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x2, 0xffffffffffffffff, 0x3) syz_emit_ethernet(0x36, &(0x7f0000000140)=ANY=[@ANYBLOB="ecf7cea7124e47e036c5ecbb5baf964b6debe112707562d6690c2e47dcf1fdc602a04a167b7340e3b4f50000002e8d1ad5de8ab98100"/83], 0x0) syz_emit_ethernet(0x156, 0x0, 0x0) syz_emit_ethernet(0x0, 0x0, 0x0) 11:52:56 executing program 2: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) recvfrom$unix(r0, 0x0, 0x0, 0x0, 0x0, 0x0) 11:52:56 executing program 5: syz_mount_image$vfat(&(0x7f0000000240), 0x0, 0x0, 0x1, &(0x7f0000001480)=[{0x0}], 0x0, &(0x7f0000001500)={[], [{@hash}]}) 11:52:56 executing program 1: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$inet_pktinfo(r0, 0x0, 0x22, 0x0, &(0x7f0000004f40)) 11:52:56 executing program 0: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x1, &(0x7f0000001480)=[{0x0}], 0x0, 0x0) 11:52:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x2d01, 0x0) writev(r0, &(0x7f0000001a40)=[{0x0}, {&(0x7f0000000500)="a0", 0xcd1f}], 0x1cd) [ 743.299906][ T26] audit: type=1400 audit(1639309976.220:321): avc: denied { append } for pid=15822 comm="syz-executor.4" name="random" dev="devtmpfs" ino=8 scontext=root:sysadm_r:sysadm_t tcontext=system_u:object_r:random_device_t tclass=chr_file permissive=1 11:52:56 executing program 5: pipe(&(0x7f00000024c0)={0xffffffffffffffff, 0xffffffffffffffff}) close(r0) pipe(&(0x7f0000000140)) close(r1) 11:52:56 executing program 1: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x2d01, 0x0) writev(r0, &(0x7f0000001a40)=[{0x0}, {&(0x7f0000000500)="a0", 0xcd1f}], 0x1cd) 11:52:56 executing program 0: r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000040)='./file0\x00', 0x20) 11:52:56 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6a, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000080), 0x2d01, 0x0) writev(r0, &(0x7f0000001a40)=[{0x0}, {&(0x7f0000000500)="a0", 0xcd1f}], 0x1cd) [ 743.624076][T15830] loop3: detected capacity change from 0 to 61456 11:52:56 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f00000003c0)=[{&(0x7f0000000200)="e0", 0x1, 0x3165}, {&(0x7f0000000300)="8d9e22f3060a0d0569db", 0xa, 0xfffffffffffffff7}], 0x0, 0x0) 11:52:56 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$packet(0x11, 0x3, 0x300) r2 = socket$unix(0x1, 0x1, 0x0) r3 = socket$unix(0x1, 0x1, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$unix(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f0000000080)="fa", 0x1}], 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="28000000000000000100000001000000", @ANYRES32=r0, @ANYRES32=r0, @ANYRES32=r1, @ANYRES32=r2, @ANYRES32=r3, @ANYRES32=r4, @ANYBLOB="10000000000000000100000001"], 0x38}, 0x0) [ 743.932402][T15843] loop1: detected capacity change from 0 to 16383 [ 744.058818][ C0] BUG at fs/jfs/jfs_logmgr.c:2313 assert(bp->l_flag & lbmRELEASE) [ 744.067331][ C0] ------------[ cut here ]------------ [ 744.072796][ C0] kernel BUG at fs/jfs/jfs_logmgr.c:2313! [ 744.078526][ C0] invalid opcode: 0000 [#1] PREEMPT SMP KASAN [ 744.084946][ C0] CPU: 0 PID: 13 Comm: ksoftirqd/0 Not tainted 5.16.0-rc4-syzkaller #0 [ 744.093208][ C0] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 744.103282][ C0] RIP: 0010:lbmIODone.cold+0xc9/0x116 [ 744.108767][ C0] Code: 68 c3 b3 f8 eb d3 e8 31 89 6d f8 48 c7 c1 e0 8a e6 89 ba 09 09 00 00 48 c7 c6 20 89 e6 89 48 c7 c7 60 89 e6 89 e8 ec 12 f8 ff <0f> 0b e8 0b 89 6d f8 48 c7 c1 20 8b e6 89 ba 0a 09 00 00 48 c7 c6 [ 744.128391][ C0] RSP: 0018:ffffc90000f3fc88 EFLAGS: 00010082 [ 744.134479][ C0] RAX: 000000000000003f RBX: ffff8880208bf100 RCX: 0000000000000000 [ 744.142473][ C0] RDX: ffff888011c86040 RSI: ffffffff815e52a8 RDI: fffff520001e7f83 [ 744.150462][ C0] RBP: 0000000000000020 R08: 000000000000003f R09: 0000000000000000 [ 744.158457][ C0] R10: ffffffff815df04e R11: 0000000000000000 R12: 0000000000000246 [ 744.166448][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 744.174431][ C0] FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 744.183379][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 744.189979][ C0] CR2: 00007f3fa25ed000 CR3: 00000000412c7000 CR4: 00000000003506f0 [ 744.197969][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 744.205953][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 744.213944][ C0] Call Trace: [ 744.217233][ C0] [ 744.220170][ C0] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 744.226446][ C0] ? bio_uninit+0x1b3/0x3d0 [ 744.231079][ C0] ? lbmFree+0x100/0x100 [ 744.235357][ C0] bio_endio+0x5ec/0x770 [ 744.239622][ C0] blk_update_request+0x46a/0x1400 [ 744.244812][ C0] blk_mq_end_request+0x4b/0x80 [ 744.249682][ C0] lo_complete_rq+0x1c2/0x280 [ 744.254438][ C0] blk_complete_reqs+0xad/0xe0 [ 744.259237][ C0] __do_softirq+0x29b/0x9c2 [ 744.263772][ C0] ? __irq_exit_rcu+0x180/0x180 [ 744.268731][ C0] run_ksoftirqd+0x2d/0x60 [ 744.273173][ C0] smpboot_thread_fn+0x645/0x9c0 [ 744.278187][ C0] ? __smpboot_create_thread.part.0+0x370/0x370 [ 744.284452][ C0] kthread+0x405/0x4f0 [ 744.288583][ C0] ? set_kthread_struct+0x130/0x130 [ 744.293806][ C0] ret_from_fork+0x1f/0x30 [ 744.298294][ C0] [ 744.301317][ C0] Modules linked in: [ 744.305226][ C0] ---[ end trace 7200a80d946f066f ]--- [ 744.310683][ C0] RIP: 0010:lbmIODone.cold+0xc9/0x116 [ 744.316082][ C0] Code: 68 c3 b3 f8 eb d3 e8 31 89 6d f8 48 c7 c1 e0 8a e6 89 ba 09 09 00 00 48 c7 c6 20 89 e6 89 48 c7 c7 60 89 e6 89 e8 ec 12 f8 ff <0f> 0b e8 0b 89 6d f8 48 c7 c1 20 8b e6 89 ba 0a 09 00 00 48 c7 c6 [ 744.335705][ C0] RSP: 0018:ffffc90000f3fc88 EFLAGS: 00010082 [ 744.341783][ C0] RAX: 000000000000003f RBX: ffff8880208bf100 RCX: 0000000000000000 [ 744.349767][ C0] RDX: ffff888011c86040 RSI: ffffffff815e52a8 RDI: fffff520001e7f83 [ 744.357750][ C0] RBP: 0000000000000020 R08: 000000000000003f R09: 0000000000000000 [ 744.365731][ C0] R10: ffffffff815df04e R11: 0000000000000000 R12: 0000000000000246 [ 744.373723][ C0] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 744.381713][ C0] FS: 0000000000000000(0000) GS:ffff8880b9c00000(0000) knlGS:0000000000000000 [ 744.390660][ C0] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 744.397261][ C0] CR2: 00007f3fa25ed000 CR3: 00000000412c7000 CR4: 00000000003506f0 [ 744.405256][ C0] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 744.413242][ C0] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 744.421226][ C0] Kernel panic - not syncing: Fatal exception in interrupt [ 744.428656][ C0] Kernel Offset: disabled [ 744.432978][ C0] Rebooting in 86400 seconds..